""ET CURRENT_EVENTS Successful Sparkasse Credential Phish M1 2022-04-13""
SID: 2035933
Revision: 1
Class Type: trojan-activity
Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2022_04_13, deployment Perimeter, signature_severity Major, updated_at 2022_04_13
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "POST"
-
Value: "Code?sslchannel=true&sessionid=" Depth: 32
-
Value: "vic_browser=n%2Fa&vic_os=n%2Fa&vic_screen=n%2Fa&vic_lang=n%2Fa&vic_flash=n%2Fa&vic_java=n%2Fa&vic_mime=n%2Fa&vic_plugins=n%2Fa&vic_fonts=n%2Fa" Depth: 142
-
Value: "=Submit&login_name="
-
Value: "&pin="
Within:
PCRE:
Special Options:
-
http_method
-
http_uri
-
fast_pattern
-
http_client_body
-
http_client_body
-
http_client_body