""ET CURRENT_EVENTS JDB Exploit Kit Landing Page""
SID: 2016307
Revision: 3
Class Type: trojan-activity
Metadata: created_at 2013_01_30, updated_at 2013_01_30
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,from_server
Contents:
-
Value: "Adobe Flash must be updated to view this"
-
Value: "/lib/adobe.php?id="
Within:
PCRE: "/^[a-f0-9]{32}/R"
Special Options:
-
file_data
-
fast_pattern