""ET TROJAN Sofacy Request Outbound""

SID: 2019545

Revision: 1237

Class Type: trojan-activity

Metadata: created_at 2014_10_29, updated_at 2017_04_18

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "/?"

  • Value: "&ai="

  • Value: !"Referer"

  • Value: "Windows NT"

  • Value: !"&adurl="

Within:

PCRE: "/^\/[a-z]+?\/\?(?:[a-z]+?=[A-Za-z0-9\x5f\x2d]+&){1,}ai=[^&]{5}(?:[A-Za-z0-9\x5f\x2d]{4})*(?:[A-Za-z0-9\x5f\x2d]{2}==|[A-Za-z0-9\x5f\x2d]{3}=|[A-Za-z0-9\x5f\x2d]{4})(?:&|$)/U"

Special Options:

  • http_uri

  • http_uri

  • http_header

  • http_header

  • http_uri

source