Summary:
18 new OPEN, 28 new PRO (18 + 10).
Win32/Injector.DKUN, Sidewinder APT, Powershell/PowHeartBeat CnC and IcedID.
Thanks @ESET, @HuntressLabs and @zscaler
Added rules:
Open:
- 2012707 - ET MALWARE Win32/Injector.DKUN Variant Response (malware.rules)
- 2038809 - ET HUNTING Suspicious Windows Installer UA for non-MSI (hunting.rules)
- 2038810 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038811 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038812 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038813 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038814 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038815 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038816 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038817 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038818 - ET MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2038819 - ET INFO SQLite DLL Retrieval by Name (GET) (info.rules)
- 2038820 - ET MALWARE Sidewinder APT Related Malware Activity M1 (GET) (malware.rules)
- 2038821 - ET MALWARE Powershell/PowHeartBeat CnC Checkin - ICMP (malware.rules)
- 2038822 - ET MALWARE Observed DNS Query to Malicious Powershell Payload domain (onerecovery .click) (malware.rules)
- 2038823 - ET MALWARE Observed DNS Query to Reverse Shell Payload Domain (opentunnel .quest) (malware.rules)
- 2038824 - ET MALWARE Observed Malicious Powershell Payload Delivery Domain (onerecovery .click) in TLS SNI (malware.rules)
- 2038825 - ET MALWARE Observed Reverse Shell Payload Delivery Domain
(opentunnel .quest) in TLS SNI (malware.rules)
Pro:
- 2852367 - ETPRO INFO HTTP Request With Uppercase Host Header Observed (info.rules)
- 2852368 - ETPRO MALWARE Win32/IcedID Stage2 CnC Activity M2 (GET) (malware.rules)
Modified active rules:
- 2025633 - ET MALWARE [PTsecurity] Win32/SpyAgent.Raptor (realtime-spy) CnC activity 1 (malware.rules)
- 2025634 - ET MALWARE [PTsecurity] Win32/SpyAgent.Raptor (realtime-spy) CnC activity 2 (malware.rules)
- 2032947 - ET MALWARE Ares Activity (POST) (malware.rules)
- 2037002 - ET MALWARE Win32/Grandoreiro Loader Checkin Activity (POST) (malware.rules)
- 2038618 - ET MALWARE Win32/Grandoreiro Sending System Information (POST) (malware.rules)
- 2038619 - ET MALWARE Win32/Grandoreiro Related Activity (GET) (malware.rules)
- 2833510 - ETPRO POLICY SentryPC/Realtime Spy Host Monitor Software Screenshot POST (policy.rules)
Removed rules:
- 2012707 - ET HUNTING Suspicious double Server Header (hunting.rules)
- 2832607 - ETPRO HUNTING Suspicious Windows Installer UA for non-MSI (hunting.rules)
- 2850605 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2850606 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2850607 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2850608 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2850609 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2850610 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2850611 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2850612 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2850621 - ETPRO MALWARE Gamaredon Related Maldoc Activity (GET) (malware.rules)
- 2852278 - ETPRO MALWARE HTML/TrojanDownloader.Agent.NKU CnC Activity M1 (malware.rules)