""ET CURRENT_EVENTS Successful Metamask Pass Phrase Phish 2023-02-01""

SID: 2044054

Revision: 1

Class Type: trojan-activity

Metadata: attack_target Client_Endpoint, created_at 2023_02_01, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2023_02_01

Reference:

  • md5

  • d9c04e99213935f75f5881267a8317de

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "wphrase=" Depth: 8

  • Value: "&btn1="

  • Value: "POST /meta/next.php|20|" Depth: 20

Within:

PCRE:

Special Options:

  • http_client_body

  • http_client_body

  • fast_pattern

source