""ET CURRENT_EVENTS Covid19 Stimulus Payment Phish Inbound M1 (2021-10-21)""
SID: 2034232
Revision: 1
Class Type: trojan-activity
Metadata: created_at 2021_10_21, updated_at 2021_10_21
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: from_server,established
Contents:
-
Value: "200"
-
Value: "
New|20|Stimulus|20|payment" -
Value: "
YOUR|20|CART<|2f|h2>"
-
Value: "|20|EXTRA|20|BONUS|22|"
-
Value: "An|20|agent|20|will|20|contact"
Within:
PCRE:
Special Options:
-
http_stat_code
-
file_data
-
fast_pattern