""ET TROJAN Win32.Chroject.B Retrieving encoded payload""

SID: 2020746

Revision: 9

Class Type: trojan-activity

Metadata: created_at 2015_03_25, performance_impact Significant, updated_at 2024_04_08

Reference:

  • md5

  • 6c8c988a8129ff31ad0e764e59b31200

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: to_server,established

Contents:

  • Value: "GET"

  • Value: !"Referer|3a|"

  • Value: !"."

  • Value: "/en-us/" Depth: 7

  • Value: "=|20|HTTP/1.1|0d 0a|Accept|3a 20|/|0d 0a|"

  • Value: !"/im/"

Within:

PCRE: "/^\/en-us\/(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)$/U"

Special Options:

  • http_method

  • http_header

  • http_uri

  • http_uri

  • fast_pattern

  • http_uri

source