""ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Request (set)""
SID: 2024220
Revision: 3
Class Type: trojan-activity
Metadata: attack_target SMB_Server, created_at 2017_04_17, deployment Internal, signature_severity Critical, updated_at 2017_11_27
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: 445
Flow: to_server,established
Contents:
-
Value: "|00 00 00 31 ff|SMB|2b 00 00 00 00 18 07 c0|" Depth: 16
-
Value: "|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"
Within:
PCRE:
Special Options:
- fast_pattern