""ET INFO SUSPICIOUS Possible Evil Download wsf Double Ext No Referer""

SID: 2022271

Revision: 2

Class Type: trojan-activity

Metadata: created_at 2015_12_17, updated_at 2017_02_02

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: !"User-Agent|3a 20 2a|"

  • Value: ".wsf"

Within:

PCRE: "/\/[^\x2f]+.[^\x2f]+.wsf$/Ui"

Special Options:

  • http_method

  • http_header

  • http_uri

  • nocase

source