#alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET CURRENT_EVENTS Probable Scalaxy exploit kit secondary request"; flow:established,to_server; content:"=1.6.0_"; http_uri; pcre:"/^\/[a-z][0-9a-z_+=-]{10,30}\?\w=[0-9.]+\&\w=1.6.0_\d\d$/Ui"; flowbits:set,et.exploitkitlanding; classtype:bad-unknown; sid:2014024; rev:4; metadata:created_at 2011_12_12, updated_at 2011_12_12;)

Added 2017-08-07 21:07:20 UTC


#alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET CURRENT_EVENTS Probable Scalaxy exploit kit secondary request"; flow:established,to_server; content:"=1.6.0_"; http_uri; pcre:"/^\/[a-z][0-9a-z_+=-]{10,30}\?\w=[0-9.]+\&\w=1.6.0_\d\d$/Ui"; flowbits:set,et.exploitkitlanding; classtype:bad-unknown; sid:2014024; rev:4;)

Added 2017-04-18 17:26:19 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS Probable Scalaxy exploit kit secondary request"; flow:established,to_server; content:"=1.6.0_"; http_uri; fast_pattern:only; pcre:"/^\/[a-z][0-9a-z_+=-]{10,30}\?\w=[0-9.]+\&\w=1.6.0_\d\d$/Ui"; flowbits:set,et.exploitkitlanding; classtype:bad-unknown; sid:2014024; rev:5;)

Added 2012-03-15 10:52:25 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS Probable Scalaxy exploit kit secondary request"; flow:established,to_server; content:"/a"; http_uri; depth:2; content:"=1.6.0_"; http_uri; fast_pattern; content:"/z/"; http_header; pcre:"/^\/a[0-9A-Za-z_+=-]{10,30}\?\w=[0-9.]+\&\w=1.6.0_\d+$/U"; flowbits:set,et.exploitkitlanding; classtype:bad-unknown; sid:2014024; rev:3;)

Added 2012-03-09 21:24:48 UTC


#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS Probable Scalaxy exploit kit secondary request"; flow:established,to_server; content:"/a"; http_uri; depth:2; content:"=1.6.0_"; http_uri; fast_pattern; content:"/z/"; http_header; pcre:"/^\/a[0-9A-Za-z_+=-]{10,30}\?\w=[0-9.]+\&\w=1.6.0_\d+$/U"; flowbits:set,et.exploitkitlanding; classtype:bad-unknown; sid:2014024; rev:3;)

Added 2012-03-09 16:28:44 UTC


#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS Probable Scalaxy exploit kit secondary request"; flow:established,to_server; content:"/"; http_uri; offset:2; depth:3; content:"?pdf="; http_uri; distance:32; within:37; fast_pattern; pcre:"/\/[a-z]\/[0-9a-f]{32}\?pdf=/U"; classtype:bad-unknown; sid:2014024; rev:2;)

Added 2011-12-12 18:17:58 UTC


Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats