alert tcp $EXTERNAL_NET ![80,443,5938] → $HOME_NET any (msg:“ET MALWARE [ANY.RUN] RisePro TCP v.0.1 (External IP)”; flow:established,to_client; dsize:19<>29; content:“|00 00 00 21 27 00 00|”; offset:5; depth:8; reference:md5,a1f3423e231abd59d45b2ec37f751bbc; reference:url,app.any.run/tasks/d4c145cc-6a2d-4512-9cd6-555f0f2e17ed; classtype:command-and-control; sid:2046267; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_06_14, deployment Perimeter, former_category MALWARE, malware_family RisePro, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_06_16; target:dest_ip;)
alert tcp $HOME_NET any → $EXTERNAL_NET ![80,443,445,5938] (msg:“ET MALWARE [ANY.RUN] RisePro TCP v.0.1 (Exfiltration)”; flow:established,to_server; dsize:>1100; content:“|00 1F 27 00 00|”; offset:7; depth:5; reference:md5,a1f3423e231abd59d45b2ec37f751bbc; reference:url,app.any.run/tasks/d4c145cc-6a2d-4512-9cd6-555f0f2e17ed; classtype:command-and-control; sid:2046270; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_06_14, deployment Perimeter, former_category MALWARE, malware_family RisePro, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_06_23; target:src_ip;)
These updated rules ain’t working for us after modifying it according to our requirements, it’s still triggering the alert making it spam our channel.
Our modified rule based on the rule that you have provided:
alert tcp $EXTERNAL_NET any → $HOME_NET ![5938,443,80] (msg:“Possible MALWARE [ANY.RUN] RisePro TCP v.0.1 (External IP)”; flow:established,to_client; dsize:19<>29; content:!“.teamviewer.com”;nocase; content:“|00 00 00 21 27 00 00|”; offset:5; depth:8; reference:md5,a1f3423e231abd59d45b2ec37f751bbc; reference:url,app.any.run/tasks/d4c145cc-6a2d-4512-9cd6-555f0f2e17ed; target:dest_ip; priority:1; sid:2402175;)
It’s triggering for the port 5938 on the subdomains of teamviewer.com (router9.teamviewer.com, router10.teamviewer.com, routerpool9.rlb.teamviewer.com, routerpool10.rlb.teamviewer.com) Can you please check our modified rule and suggest any changes if required as this rule ain’t working for us.