""ET CURRENT_EVENTS Suspicious Script Loaded from Pastebin""

SID: 2022376

Revision: 1

Class Type: trojan-activity

Metadata: created_at 2016_01_20, updated_at 2016_01_20

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "pastebin.com/raw"

  • Value: "<script "

Within:

PCRE: "/^(?:(?!<\/script>).)?src\s=\s*\x5c?[\x22\x27]https?\x3a\/\/(?:www.)?pastebin.com\/raw(?:\/|.php\?i=)[A-Z-a-z0-9]{8}[\x22\x27]/Rsi"

Special Options:

  • file_data

source