""ET TROJAN Possible Windows executable sent when remote host claims to send html content""

SID: 2009897

Revision: 11

Class Type: trojan-activity

Metadata: created_at 2010_07_30, performance_impact Moderate, updated_at 2024_04_10

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "Content-Type|3a 20|text/html"

  • Value: "MZ"

  • Value: "PE|00 00|"

  • Value: !"Content-Type|3a 20|application"

Within: 4

PCRE:

Special Options:

  • nocase

  • http_header

  • file_data

  • fast_pattern

  • nocase

  • http_header

source