""ET CURRENT_EVENTS DRIVEBY EXE Embeded in Page Likely Evil M1""

SID: 2020893

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Any, attack_target Client_Endpoint, created_at 2015_04_11, deployment Perimeter, signature_severity Major, tag DriveBy, updated_at 2015_04_11

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "vbscript"

  • Value: "|22|4D5A90"

  • Value: !"|22|"

Within: 500

PCRE: "/^[a-f0-9]{500}/Rsi"

Special Options:

  • file_data

  • nocase

  • fast_pattern

  • nocase

source