Ruleset Update Summary - 2025/08/04 - v10985

Summary:

22 new OPEN, 28 new PRO (22 + 6)

Thanks @Malwarebytes


Added rules:

Open:

  • 2063879 - ET INFO DYNAMIC_DNS Query to a *.clandestina .org domain (info.rules)
  • 2063880 - ET INFO DYNAMIC_DNS HTTP Request to a *.clandestina .org domain (info.rules)
  • 2063881 - ET INFO DYNAMIC_DNS Query to a *.meteotodi .it domain (info.rules)
  • 2063882 - ET INFO DYNAMIC_DNS HTTP Request to a *.meteotodi .it domain (info.rules)
  • 2063883 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bittsgly .my) (malware.rules)
  • 2063884 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (bittsgly .my) in TLS SNI (malware.rules)
  • 2063885 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (akkeod .com) (malware.rules)
  • 2063886 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (akkeod .com) in TLS SNI (malware.rules)
  • 2063887 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mocadia .com) (malware.rules)
  • 2063888 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (mocadia .com) in TLS SNI (malware.rules)
  • 2063889 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (templfuw .my) (malware.rules)
  • 2063890 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (templfuw .my) in TLS SNI (malware.rules)
  • 2063891 - ET WEB_SPECIFIC_APPS Ilevia EVE X1 Server Command Injection Attempt (web_specific_apps.rules)
  • 2063892 - ET WEB_SPECIFIC_APPS Ilevia EVE X1 Server dbcheck.php db_log parameter Pre-Auth File Disclosure Attempt (web_specific_apps.rules)
  • 2063893 - ET MALWARE Stealerium CnC Exfil via Discord (POST) (malware.rules)
  • 2063894 - ET WEB_SPECIFIC_APPS ABB Cylon Aspect Unauthenticated Directory Traversal and Arbitrary File Upload Attempt (web_specific_apps.rules)
  • 2063895 - ET MALWARE TA569 Gholoader CnC Domain in DNS Lookup (docs .nynovation .com) (malware.rules)
  • 2063896 - ET MALWARE TA569 Gholoader CnC Domain in TLS SNI (docs .nynovation .com) (malware.rules)
  • 2063897 - ET MALWARE Observed DNS Query to Vidar Stealer Domain (soft-gets .com) (malware.rules)
  • 2063898 - ET MALWARE Observed DNS Query to Vidar Stealer Domain (reaitek .com) (malware.rules)
  • 2063899 - ET MALWARE Observed Vidar Stealer Domain (soft-gets .com in TLS SNI) (malware.rules)
  • 2063900 - ET MALWARE Observed Vidar Stealer Domain (reaitek .com in TLS SNI) (malware.rules)

Pro:

  • 2863971 - ETPRO MALWARE Win32/zgRAT CnC Checkin (malware.rules)
  • 2863972 - ETPRO MALWARE Win32/zgRAT CnC Checkin (malware.rules)
  • 2863995 - ETPRO MALWARE Observed TA455 Style URI (malware.rules)
  • 2863996 - ETPRO PHISHING TA4903 Domain in DNS Lookup (phishing.rules)
  • 2863997 - ETPRO PHISHING TA4903 Domain in TLS SNI (phishing.rules)
  • 2863998 - ETPRO HUNTING Observed Suspicious Character Escape Sequence Often Used In Command Injection Attempts (hunting.rules)

Modified inactive rules:

  • 2048902 - ET MALWARE [ANY.RUN] zgRAT / PureLogs Stealer C2 Connection M1 (malware.rules)