""ET TROJAN Windows executable base64 encoded in XML""

SID: 2019716

Revision: 8

Class Type: trojan-activity

Metadata: created_at 2014_11_15, updated_at 2014_11_15

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "bin.base64"

  • Value: "<file"

  • Value: "<stream"

  • Value: "<?xml"

  • Value: "TVqQA"

Within:

PCRE: "/^[A-Za-z0-9\s/+]{100}/Rs"

Special Options:

  • file_data

  • nocase

  • nocase

  • nocase

  • nocase

  • fast_pattern

source