Drop.conf not working

Hi,

Following is my drop.conf
#drop rules containing a specific message pattern
metadata: signature_severity Major
metadata: tag Dshield
metadata: tag TA_Abused_Online_Service
metadata: tag Exploit
metadata: tag CISA_KEV
metadata: tag CINS
metadata: tag COMPROMISED
msg:“:paw_prints: - :black_flag:<200d>:skull_and_crossbones: Connection to an IP flagged at Log4Shell Exploit Attempt”

following is the result when I run suricata-update
11/9/2025 – 19:23:50 - – Using data-directory /var/lib/suricata.
11/9/2025 – 19:23:50 - – Using Suricata configuration /etc/suricata/suricata.yaml
11/9/2025 – 19:23:50 - – Using /usr/share/suricata/rules for Suricata provided rules.
11/9/2025 – 19:23:50 - – Found Suricata version 7.0.10 at /usr/bin/suricata.
11/9/2025 – 19:23:50 - – Loading /etc/suricata/drop.conf.
metadata: signature_severity Major
metadata: tag Dshield
metadata: tag TA_Abused_Online_Service
metadata: tag Exploit
metadata: tag CISA_KEV
metadata: tag CINS
metadata: tag COMPROMISED
msg:“:paw_prints: - :black_flag:<200d>:skull_and_crossbones: Connection to an IP flagged at Log4Shell Exploit Attempt”
11/9/2025 – 19:23:50 - – Failed to parse: “msg:“:paw_prints: - :black_flag:<200d>:skull_and_crossbones: Connection to an IP flagged at Log4Shell Exploit Attempt””

it failed to phrase only msg:“:paw_prints: - :black_flag:<200d>:skull_and_crossbones: Connection to an IP flagged at Log4Shell Exploit Attempt”

and I tired reference as well

following is the rule

alert ip any any → 159.89.154.102 any (msg:“🐾 - 🏴<200d>☠️ Connection to an IP flagged at Log4Shell Exploit Attempt”; reference: url,  ; reference: url,https://www.lunasec.io/docs/blog/log4j-zero-day/; reference: url,  ; metadata:created_at 2021_12_17, updated_at 2021_12_17; sid:3312323; rev:1; classtype:trojan-activity;)

I cannot do by SID because there are lot of SIDs related to this rule