""ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Checkin 3""

SID: 2020656

Revision: 2

Class Type: trojan-activity

Metadata: created_at 2015_03_09, updated_at 2015_03_10

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: to_server,established

Contents:

  • Value: "/rico.php"

Within:

PCRE: "/^Host\x3a[^\r\n]+\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}\r\n/Hmi"

Special Options:

source