""ET CURRENT_EVENTS LinkedIn Phish Landing Page 2022-01-31""

SID: 2035022

Revision: 2

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2022_01_31, deployment Perimeter, signature_severity Major, updated_at 2022_01_31

Reference:

  • md5

  • 05376d1db31ee300b1d567a91bcc22d5

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "200"

  • Value: "|3c|title|3e|Messages|20 7c 20|Linkedln|20 7c 20|Welcome|20|back|2e 2e 2e 3c 2f|title|3e|"

Within:

PCRE:

Special Options:

  • http_stat_code

  • file_data

  • nocase

source