""ET TROJAN Win32.Chroject.B Retrieving encoded payload""
SID: 2020746
Revision: 9
Class Type: trojan-activity
Metadata: created_at 2015_03_25, performance_impact Significant, updated_at 2024_04_08
Reference:
-
md5
-
6c8c988a8129ff31ad0e764e59b31200
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow: to_server,established
Contents:
-
Value: "GET"
-
Value: !"Referer|3a|"
-
Value: !"."
-
Value: "/en-us/" Depth: 7
-
Value: "=|20|HTTP/1.1|0d 0a|Accept|3a 20|/|0d 0a|"
-
Value: !"/im/"
Within:
PCRE: "/^\/en-us\/(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)$/U"
Special Options:
-
http_method
-
http_header
-
http_uri
-
http_uri
-
fast_pattern
-
http_uri