""ET TROJAN Sofacy Request Outbound""
SID: 2019545
Revision: 1237
Class Type: trojan-activity
Metadata: created_at 2014_10_29, updated_at 2017_04_18
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "/?"
-
Value: "&ai="
-
Value: !"Referer"
-
Value: "Windows NT"
-
Value: !"&adurl="
Within:
PCRE: "/^\/[a-z]+?\/\?(?:[a-z]+?=[A-Za-z0-9\x5f\x2d]+&){1,}ai=[^&]{5}(?:[A-Za-z0-9\x5f\x2d]{4})*(?:[A-Za-z0-9\x5f\x2d]{2}==|[A-Za-z0-9\x5f\x2d]{3}=|[A-Za-z0-9\x5f\x2d]{4})(?:&|$)/U"
Special Options:
-
http_uri
-
http_uri
-
http_header
-
http_header
-
http_uri