""ET CURRENT_EVENTS Standard Bank Login Phish 2022-02-04""

SID: 2035124

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2022_02_07, deployment Perimeter, signature_severity Major, updated_at 2022_02_07

Reference:

  • md5

  • 444401e72463904c6ccd11654e7cc789

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "200"

  • Value: "Sign in"

  • Value: "id|3d 22|sign|20|in|22 20|name|3d 22|Sign|20|in|20|with|20|your|20|Standard|20|Bank|20|ID|22|"

  • Value: "|3c|div|20|class|3d 22|ping|2d|header|22 3e|Sign|20|in|20|with|20|your|20|Standard|20|Bank|20|ID|3c 2f|div|3e|"

  • Value: "Don|27|t|20|have|20|a|20|Standard|20|Bank|20|ID|3f 20 3c|a|20|onclick|3d 22|login|2e|postRegistration|28 29 22 3e|Register|20|here|3c 2f|a|3e 3c 2f|div|3e|"

Within:

PCRE:

Special Options:

  • http_stat_code

  • file_data

  • fast_pattern

source