""ET CURRENT_EVENTS Possible RedDotv2 applet with 32hex value Landing Page""

SID: 2016643

Revision: 4

Class Type: trojan-activity

Metadata: created_at 2013_03_22, updated_at 2013_03_22

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "<applet"

  • Value: "value"

Within: 500

PCRE: "/^[\r\n\s]=[\r\n\s](?P[\x22\x27])[a-f0-9]{32}(?P=q1)/Rsi"

Special Options:

  • file_data

  • nocase

  • nocase

source