""ET CURRENT_EVENTS Download file with Powershell via LNK file (observed in Sundown EK)""

SID: 2020987

Revision: 1

Class Type: trojan-activity

Metadata: created_at 2015_04_24, updated_at 2015_04_24

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "|4c 00 00 00|"

  • Value: "c|00|m|00|d|00|.|00|e|00|x|00|e"

  • Value: "P|00|o|00|w|00|e|00|r|00|S|00|h|00|e|00|l|00|l"

  • Value: "D|00|o|00|w|00|n|00|l|00|o|00|a|00|d|00|F|00|i|00|l|00|e"

Within: 4

PCRE:

Special Options:

  • file_data

  • nocase

  • nocase

  • nocase

source