""ET TROJAN Win32/Phorpiex Template 6 Active - Outbound Malicious Email Spam""

SID: 2031210

Revision: 2

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, created_at 2020_11_17, deployment Perimeter, deployment Internal, malware_family Phorpiex, performance_impact Low, signature_severity Major, tag SpamBot, updated_at 2020_11_17

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: [25,26,587]

Flow: established,to_server

Contents:

  • Value: "Subject|3a 20|YOU|20|BETTER|20|READ|20|THIS|0d|"

  • Value: "COLLECTED|20|ALL|20|YOUR|20|FILES"

  • Value: "in|20|Bitcoin"

  • Value: "receiving|20|the|20|Bitcoin"

Within:

PCRE:

Special Options:

  • fast_pattern

  • nocase

  • nocase

source