""ET CURRENT_EVENTS Outlook WebApp Phish Landing 2015-11-05""

SID: 2031690

Revision: 3

Class Type: trojan-activity

Metadata: created_at 2015_11_05, updated_at 2015_11_05

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "data-title=|22|Need a new Password?|22|>"

  • Value: "We|27|ll contact your admin to reset the password for|3a|"

  • Value: "We notified your admin to reset your password."

  • Value: "Now you'll need to wait until they do"

  • Value: "(or go ask them nicely, yourself)."

  • Value: "Once your admin resets your password"

  • Value: "you should receive an email with steps to login."

Within:

PCRE:

Special Options:

  • file_data

  • nocase

  • nocase

  • nocase

  • nocase

  • nocase

  • nocase

  • nocase

source