""ET INFO Suspicious POST Request with Possible COVID-19 URI M2""
SID: 2029756
Revision: 3
Class Type: bad-unknown
Metadata: attack_target Client_Endpoint, created_at 2020_03_28, deployment Perimeter, signature_severity Informational, updated_at 2020_04_02
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow:
Contents:
-
Value: "POST"
-
Value: "corona"
-
Value: !".jhu.edu|0d 0a|"
-
Value: !".ncsc.gov.ie|0d 0a|"
-
Value: !".nhs.wales|0d 0a|"
-
Value: !".govt.nz|0d 0a|"
-
Value: !".nhp.gov.in|0d 0a|"
-
Value: !".oracle.com|0d 0a|"
-
Value: !".cdc.gov|0d 0a|"
Within:
PCRE:
Special Options:
-
http_method
-
nocase
-
http_uri
-
http_header
-
http_header
-
http_header
-
http_header
-
http_header
-
http_header
-
http_header