""ET CURRENT_EVENTS Base64 HTTP URL Refresh - Common Phish Landing Obfuscation 2016-01-01""

SID: 2031695

Revision: 2

Class Type: trojan-activity

Metadata: created_at 2016_01_01, updated_at 2016_11_11

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: to_client,established

Contents:

  • Value: "<meta http-equiv="

  • Value: "refresh"

  • Value: "data|3a|text/html|3b|base64,"

  • Value: !"cGFnZV9ub3RfZm91bmQuaHRtb"

Within:

PCRE: "/^(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=|[A-Za-z0-9+/]{4})\x22|\x27/Rsi"

Special Options:

  • file_data

  • nocase

  • nocase

  • fast_pattern

  • nocase

source