""ET CURRENT_EVENTS Base64 http argument in applet (Neutrino/Angler)""

SID: 2016549

Revision: 4

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2013_03_07, deployment Perimeter, malware_family Angler, signature_severity Critical, tag Angler, tag Exploit_Kit, updated_at 2013_10_11

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "<applet "

  • Value: "aHR0cDov"

Within:

PCRE: "/^((?!<\/applet>).)+?[\x22\x27]aHR0cDov/Rs"

Special Options:

  • file_data

source