""ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response""
SID: 2024218
Revision: 3
Class Type: trojan-activity
Metadata: attack_target SMB_Server, created_at 2017_04_17, deployment Internal, signature_severity Critical, updated_at 2017_11_27
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: 445
Destination Network: any
Destination Port: any
Flow: from_server,established
Contents:
-
Value: "|00 00 00 31 ff|SMB|2b 00 00 00 00 98 07 c0|" Depth: 16
-
Value: "|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"
Within:
PCRE:
Special Options:
- fast_pattern