""ET TROJAN Win32/Phorpiex Template 6 Active - Outbound Malicious Email Spam""
SID: 2031210
Revision: 2
Class Type: trojan-activity
Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, created_at 2020_11_17, deployment Perimeter, deployment Internal, malware_family Phorpiex, performance_impact Low, signature_severity Major, tag SpamBot, updated_at 2020_11_17
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: [25,26,587]
Flow: established,to_server
Contents:
-
Value: "Subject|3a 20|YOU|20|BETTER|20|READ|20|THIS|0d|"
-
Value: "COLLECTED|20|ALL|20|YOUR|20|FILES"
-
Value: "in|20|Bitcoin"
-
Value: "receiving|20|the|20|Bitcoin"
Within:
PCRE:
Special Options:
-
fast_pattern
-
nocase
-
nocase