""ET EXPLOIT Possible ETERNALROMANCE MS17-010 Heap Spray""
SID: 2024219
Revision: 2
Class Type: trojan-activity
Metadata: attack_target SMB_Server, created_at 2017_04_17, deployment Internal, signature_severity Critical, updated_at 2017_04_17
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: 445
Flow: to_server,established
Contents:
-
Value: "|ff|SMB|25 00 00 00 00 18|" Depth: 10 Offset: 4
-
Value: "|07 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 08|"
-
Value: "|00 08|"
-
Value: "|0e 00 00 40 00|"
-
Value: "|00 00 00 00 00 00 01 00 00 00 00 00 00 00 00|"
-
Value: "|00 00 00 00 00 00 00 00 00|"
Within: 15
PCRE:
Special Options:
- fast_pattern