""ET TROJAN Windows executable base64 encoded in XML""
SID: 2019716
Revision: 8
Class Type: trojan-activity
Metadata: created_at 2014_11_15, updated_at 2014_11_15
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,from_server
Contents:
-
Value: "bin.base64"
-
Value: "<file"
-
Value: "<stream"
-
Value: "<?xml"
-
Value: "TVqQA"
Within:
PCRE: "/^[A-Za-z0-9\s/+]{100}/Rs"
Special Options:
-
file_data
-
nocase
-
nocase
-
nocase
-
nocase
-
fast_pattern