""ET TROJAN Possible Windows executable sent when remote host claims to send HTML/CSS Content""

SID: 2009909

Revision: 7

Class Type: trojan-activity

Metadata: created_at 2010_07_30, performance_impact Moderate, updated_at 2024_04_10

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "Content-Type|3a| text/css"

  • Value: "MZ"

  • Value: "PE|00 00|"

Within: 4

PCRE:

Special Options:

  • nocase

  • http_header

  • file_data

  • fast_pattern

source