""ET CURRENT_EVENTS DRIVEBY Nuclear EK Landing May 05 2014""

SID: 2018451

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, affected_product Any, attack_target Client_Endpoint, created_at 2014_05_05, deployment Perimeter, malware_family Nuclear, signature_severity Critical, tag DriveBy, tag Exploit_Kit, tag Nuclear, updated_at 2014_05_05

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: from_server,established

Contents:

  • Value: "|0d 0a|Vary|3a 20|Accept-Encoding,User-Agent"

  • Value: "|0d 0a|X-Powered-By|3a 20|PHP"

  • Value: "|ef bb bf 3c 68 74 6d 6c 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 23|"

Within: 27

PCRE: "/^[a-f0-9]{6}\x22>\r\n(?:<(?P[^>]{1,10})>[A-Za-z0-9]+?<\/(?P=tag)>\r\n){0,10}\r\n