""ET INFO Possible EXE Download From Suspicious TLD (.icu) - set""
SID: 2026891
Revision: 2
Class Type: misc-activity
Metadata: attack_target Client_Endpoint, created_at 2019_02_06, deployment Perimeter, signature_severity Minor, updated_at 2019_02_06
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
- Value: ".icu|0d 0a|"
Within:
PCRE: "/^Host\x3a[^\r\n]+.icu(?:\x3a\d{1,5})?\r?$/Hmi"
Special Options:
- http_header