Summary:
35 new OPEN, 49 new PRO (35 + 14)
Thanks @JamfSoftware, @malPileDiver, @kaspersky
Added rules:
Open:
- 2014645 - ET EXPLOIT RuggedCom Banner with MAC (SET) (exploit.rules)
- 2014646 - ET EXPLOIT RuggedCom factory account backdoor (exploit.rules)
- 2018233 - ET HUNTING JAR Sent Claiming To Be Image - Likely Exploit Kit (hunting.rules)
- 2018234 - ET HUNTING JAR Sent Claiming To Be Text Content - Likely Exploit Kit (hunting.rules)
- 2036725 - ET EXPLOIT Potential External VMware vRealize Automation Authentication Bypass Vulnerability (exploit.rules)
- 2045148 - ET MALWARE IcedID CnC Domain in DNS Lookup (ewyersbetter .com) (malware.rules)
- 2045149 - ET MALWARE IcedID CnC Domain in DNS Lookup (nizanigrola .com) (malware.rules)
- 2045150 - ET MALWARE IcedID CnC Domain in DNS Lookup (pingwiskot .com) (malware.rules)
- 2045151 - ET MALWARE IcedID CnC Domain in DNS Lookup (klonpiparf .com) (malware.rules)
- 2045152 - ET MALWARE IcedID CnC Domain in DNS Lookup (skigimeetroc .com) (malware.rules)
- 2045153 - ET MALWARE IcedID CnC Domain in DNS Lookup (auronavtimor .com) (malware.rules)
- 2045154 - ET MALWARE IcedID CnC Domain in DNS Lookup (jinowera .com) (malware.rules)
- 2045155 - ET MALWARE IcedID CnC Domain in DNS Lookup (animamagaznaf .com) (malware.rules)
- 2045156 - ET MALWARE IcedID CnC Domain in DNS Lookup (plitspiritnox .com) (malware.rules)
- 2045157 - ET MALWARE TA444 Related Domain in DNS Lookup (malware.rules)
- 2045158 - ET USER_AGENTS Win32/FakeAV InternetSecurityGuard User-Agent (user_agents.rules)
- 2045159 - ET INFO Observed DNS over HTTPS Domain in TLS SNI (pihole4 .hoerli .net) (info.rules)
- 2045160 - ET INFO Observed DNS over HTTPS Domain in TLS SNI (pihole3 .hoerli .net) (info.rules)
- 2045161 - ET INFO Observed DNS over HTTPS Domain in TLS SNI (pihole2 .hoerli .net) (info.rules)
- 2045162 - ET INFO Observed DNS over HTTPS Domain in TLS SNI (res-acst3 .absolight .net) (info.rules)
- 2045163 - ET INFO Observed DNS over HTTPS Domain in TLS SNI (resolver2 .absolight .net) (info.rules)
- 2045164 - ET INFO Observed DNS over HTTPS Domain in TLS SNI (resolver1 .absolight .net) (info.rules)
- 2045165 - ET INFO Observed DNS over HTTPS Domain in TLS SNI (pihole1 .hoerli .net) (info.rules)
- 2045166 - ET INFO Observed DNS over HTTPS Domain in TLS SNI (kilabit .info) (info.rules)
- 2045167 - ET MALWARE DNS Query to Gamaredon Domain (bankoulpi .ru) (malware.rules)
- 2045168 - ET MALWARE DNS Query to Gamaredon Domain (barutipi .ru) (malware.rules)
- 2045169 - ET MALWARE DNS Query to Gamaredon Domain (apispi .ru) (malware.rules)
- 2045170 - ET MALWARE DNS Query to Gamaredon Domain (anherpi .ru) (malware.rules)
- 2045171 - ET MALWARE DNS Query to Gamaredon Domain (fushiguro .ru) (malware.rules)
- 2045172 - ET MALWARE DNS Query to Gamaredon Domain (22defeated .ayrympo .ru) (malware.rules)
- 2045173 - ET PHISHING OV6 Phish Kit Landing Page 2023-04-24 (phishing.rules)
- 2045174 - ET MALWARE Roopy File Grabber Exfiltration Attempt (malware.rules)
- 2045175 - ET MALWARE JLORAT CnC Checkin (malware.rules)
- 2045176 - ET EXPLOIT_KIT TA569 Keitaro TDS Domain in DNS Lookup (greenpapers .org) (exploit_kit.rules)
- 2045177 - ET PHISHING Successful DHL Credential Phish 2023-04-24 (phishing.rules)
Pro:
- 2854248 - ETPRO MALWARE Win32/XWorm V2 CnC Command - PING Outbound (malware.rules)
- 2854249 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound (malware.rules)
- 2854250 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound (malware.rules)
- 2854251 - ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound (malware.rules)
- 2854252 - ETPRO MALWARE Win32/XWorm V2 CnC Command - RD+ Outbound (malware.rules)
- 2854253 - ETPRO MALWARE Win32/XWorm V2 CnC Command - RD- Inbound (malware.rules)
- 2854254 - ETPRO MALWARE Win32/XWorm V2 CnC Command - sendfileto Inbound (malware.rules)
- 2854255 - ETPRO MALWARE Win32/XWorm V3 CnC Command - sendPlugin Outbound (malware.rules)
- 2854256 - ETPRO MALWARE Win32/XWorm V3 CnC Command - savePlugin Inbound (malware.rules)
- 2854257 - ETPRO MALWARE Win32/XWorm V3 CnC Command - Informations Outbound (malware.rules)
- 2854258 - ETPRO MALWARE Win32/XWorm V3 CnC Command - GetInformations Inbound (malware.rules)
- 2854259 - ETPRO MALWARE Win32/XWorm V3 CnC Command - GetInformations Outbound (malware.rules)
- 2854260 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PCShutdown Inbound (malware.rules)
- 2854261 - ETPRO MALWARE Win32/Fake LogMeInRescue CnC Exfil (POST) (malware.rules)
Modified inactive rules:
- 2016510 - ET INFO Serialized Java Applet (Used by some EKs in the Wild) (info.rules)
- 2044665 - ET INFO Outbound SMB NTLM Auth Attempt to External Address (info.rules)
- 2821749 - ETPRO INFO HTTP 522 Returned to Client Possible Broken Malware Checkin (info.rules)
Disabled and modified rules:
- 2016494 - ET INFO Serialized Java Applet (Used by some EKs in the Wild) (info.rules)
- 2034471 - ET MALWARE Danabot Associated Activity (GET) (malware.rules)
- 2043268 - ET MALWARE IcedID CnC Domain in DNS Lookup (malware.rules)
- 2043269 - ET MALWARE IcedID CnC Domain in DNS Lookup (malware.rules)
- 2043992 - ET MALWARE Observed DNS Query to IcedID Domain (swordnifhing .com) (malware.rules)
- 2043994 - ET MALWARE Observed DNS Query to IcedID Domain (trotimera .com) (malware.rules)
- 2044890 - ET MALWARE Malicious NetSupport CnC Domain in DNS Lookup (irejhg .fun) (malware.rules)
- 2044891 - ET MALWARE Malicious NetSupport Loader Domain in DNS Lookup (tumnt .top) (malware.rules)
- 2044892 - ET MALWARE Malicious NetSupport Loader Domain in DNS Lookup (rtern .top) (malware.rules)
- 2044893 - ET MALWARE Malicious NetSupport CnC Domain in DNS Lookup (dfrgb .fun) (malware.rules)
- 2850746 - ETPRO PHISHING Successful Generic Phish 2021-12-29 (phishing.rules)
- 2850747 - ETPRO PHISHING Successful Generic Phish 2021-12-29 (phishing.rules)
- 2850832 - ETPRO PHISHING Successful Generic Phish 2022-01-10 (phishing.rules)
Removed rules:
- 2014645 - ET INFO RuggedCom Banner with MAC (info.rules)
- 2014646 - ET MISC RuggedCom factory account backdoor (misc.rules)
- 2014925 - ET INFO NetSSH SSH Version String Hardcoded in Metasploit (info.rules)
- 2018233 - ET INFO JAR Sent Claiming To Be Image - Likely Exploit Kit (info.rules)
- 2018234 - ET INFO JAR Sent Claiming To Be Text Content - Likely Exploit Kit (info.rules)
- 2034330 - ET INFO Possible GoCD Authentication Bypass URI Path - add-on (info.rules)
- 2036725 - ET INFO Potential External VMware vRealize Automation Authentication Bypass Vulnerability (info.rules)