""ET CURRENT_EVENTS Possible click2play bypass Oct 19 2015 as observed in PawnStorm""

SID: 2021985

Revision: 3

Class Type: trojan-activity

Metadata: created_at 2015_10_21, updated_at 2015_10_21

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "javax.naming.InitialContext"

  • Value: "progress-class"

  • Value: ""

Within:

PCRE: "/^\s?=\s?[\x22\x27]javax.naming.InitialContext/Rsi"

Special Options:

  • file_data

  • nocase

  • nocase

source