""ET INFO Possible Hex Obfuscated JavaScript Heap Spray 0a0a0a0a""
SID: 2013267
Revision: 2
Class Type: shellcode-detect
Metadata: created_at 2011_07_14, updated_at 2017_01_27, mitre_tactic_id TA0005, mitre_tactic_name Defense_Evasion, mitre_technique_id T1027, mitre_technique_name Obfuscated_Files_or_Information
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
- Value: "|5C|x0a|5C|x0a|5C|x0a|5C|x0a"
Within:
PCRE:
Special Options:
- nocase