""ET CURRENT_EVENTS CoolEK Payload Download (5)""
SID: 2016414
Revision: 7
Class Type: trojan-activity
Metadata: created_at 2013_02_16, updated_at 2013_06_26
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: ".txt?e="
-
Value: !"Referer|3a| "
Within:
PCRE: "/.txt\?e=\d+(&[fh]=\d+)?$/U"
Special Options:
-
http_uri
-
nocase
-
http_header