""ET WEB_CLIENT Fake Virus Phone Scam Landing Oct 19 M3""
SID: 2021965
Revision: 2
Class Type: trojan-activity
Metadata: created_at 2015_10_19, updated_at 2019_08_16
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,from_server
Contents:
-
Value: ".net frame work file missing"
-
Value: "Debug malware error"
-
Value: "Please do not open"
-
Value: "avoid data corruption"
-
Value: "PLEASE DO NOT SHUT DOWN"
-
Value: "RESTART YOUR COMPUTER"
Within:
PCRE:
Special Options:
-
file_data
-
nocase
-
nocase
-
nocase
-
nocase
-
nocase
-
nocase