""ET WEB_CLIENT Fake AV Phone Scam Domain M2 Mar 3""

SID: 2022592

Revision: 3

Class Type: trojan-activity

Metadata: created_at 2016_03_03, updated_at 2019_08_28

Reference:

Protocol: udp

Source Network: $HOME_NET

Source Port: any

Destination Network: any

Destination Port: 53

Flow:

Contents:

  • Value: "|01|" Depth: 1 Offset: 2

  • Value: "|00 01 00 00 00 00 00|"

  • Value: "unattendedfile"

Within: 7

PCRE: "/^[a-z0-9\x02-\x50]{100,}\x00\x00\x01\x00\x01$/Rsi"

Special Options:

  • fast_pattern

  • nocase

source