alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET CURRENT_EVENTS Bingo EK Payload Download"; flow:established,to_server; urilen:116; content:"/?"; depth:2; http_uri; pcre:"/^\/\?[a-f0-9]{114}$/U"; content:"WinHttp.WinHttpRequest.5"; http_user_agent; fast_pattern; http_header_names; content:!"Referer|0d 0a|"; content:!"Cookie|0d 0a|"; classtype:trojan-activity; sid:2024367; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, affected_product Web_Browser_Plugins, attack_target Client_Endpoint, created_at 2017_06_08, deployment Perimeter, former_category CURRENT_EVENTS, malware_family Exploit_Kit, performance_impact Low, signature_severity Major, tag Exploit_Kit_Bingo, updated_at 2020_11_05;)

Added 2020-11-05 18:35:57 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET CURRENT_EVENTS Bingo EK Payload Download"; flow:established,to_server; urilen:116; content:"/?"; depth:2; http_uri; pcre:"/^\/\?[a-f0-9]{114}$/U"; content:"WinHttp.WinHttpRequest.5"; http_user_agent; fast_pattern; http_header_names; content:!"Referer|0d 0a|"; content:!"Cookie|0d 0a|"; classtype:trojan-activity; sid:2024367; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, affected_product Web_Browser_Plugins, attack_target Client_Endpoint, created_at 2017_06_08, deployment Perimeter, former_category CURRENT_EVENTS, malware_family Exploit_Kit, performance_impact Low, signature_severity Major, tag Exploit_Kit_Bingo, updated_at 2020_03_04;)

Added 2020-08-05 19:13:36 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET CURRENT_EVENTS Bingo EK Payload Download"; flow:established,to_server; urilen:116; content:"/?"; depth:2; http_uri; pcre:"/^\/\?[a-f0-9]{114}$/U"; content:"WinHttp.WinHttpRequest.5"; http_user_agent; fast_pattern; http_header_names; content:!"Referer|0d 0a|"; content:!"Cookie|0d 0a|"; metadata: former_category CURRENT_EVENTS; classtype:trojan-activity; sid:2024367; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, affected_product Web_Browser_Plugins, attack_target Client_Endpoint, deployment Perimeter, tag Exploit_Kit_Bingo, signature_severity Major, created_at 2017_06_08, malware_family Exploit_Kit, performance_impact Low, updated_at 2020_03_04;)

Added 2020-03-05 12:26:03 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET CURRENT_EVENTS Bingo EK Payload Download"; flow:established,to_server; urilen:116; content:"/?"; depth:2; http_uri; pcre:"/^\/\?[a-f0-9]{114}$/U"; content:"WinHttp.WinHttpRequest.5"; http_header; content:!"Referer|3a|"; http_header; content:!"Cookie|3a|"; metadata: former_category CURRENT_EVENTS; classtype:trojan-activity; sid:2024367; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, affected_product Web_Browser_Plugins, attack_target Client_Endpoint, deployment Perimeter, tag Exploit_Kit_Bingo, signature_severity Major, created_at 2017_06_08, malware_family Exploit_Kit, performance_impact Low, updated_at 2017_06_08;)

Added 2017-08-07 21:19:43 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET CURRENT_EVENTS Bingo EK Payload Download"; flow:established,to_server; urilen:116; content:"/?"; depth:2; http_uri; pcre:"/^\/\?[a-f0-9]{114}$/U"; content:"WinHttp.WinHttpRequest.5"; http_header; content:!"Referer|3a|"; http_header; content:!"Cookie|3a|"; classtype:trojan-activity; sid:2024367; rev:2;)

Added 2017-06-08 17:24:18 UTC


Topic revision: r1 - 2020-11-05 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats