Summary:
40 new OPEN, 43 new PRO (40 + 3)
Added rules:
Open:
- 2064736 - ET MALWARE VampireBot CnC Instruction Request (GET) (malware.rules)
- 2064737 - ET MALWARE VampireBot CnC Config Inbound (malware.rules)
- 2064738 - ET MALWARE VampireBot CnC ScreenCapture Exfil (POST) (malware.rules)
- 2064739 - ET MALWARE VampireBot CnC Task Request (GET) (malware.rules)
- 2064740 - ET MALWARE FrigidStealer AppleScript Payload (malware.rules)
- 2064741 - ET INFO DYNAMIC_DNS Query to a *.litos .co .uk domain (info.rules)
- 2064742 - ET INFO DYNAMIC_DNS HTTP Request to a *.litos .co .uk domain (info.rules)
- 2064743 - ET INFO DYNAMIC_DNS Query to a *.hippocentre .ru domain (info.rules)
- 2064744 - ET INFO DYNAMIC_DNS HTTP Request to a *.hippocentre .ru domain (info.rules)
- 2064745 - ET INFO DYNAMIC_DNS Query to a *.rkumar .com .np domain (info.rules)
- 2064746 - ET INFO DYNAMIC_DNS HTTP Request to a *.rkumar .com .np domain (info.rules)
- 2064747 - ET INFO DYNAMIC_DNS Query to a *.intinet .com .ar domain (info.rules)
- 2064748 - ET INFO DYNAMIC_DNS HTTP Request to a *.intinet .com .ar domain (info.rules)
- 2064749 - ET INFO DYNAMIC_DNS Query to a *.euro-line .hu domain (info.rules)
- 2064750 - ET INFO DYNAMIC_DNS HTTP Request to a *.euro-line .hu domain (info.rules)
- 2064751 - ET INFO DYNAMIC_DNS Query to a *.insuter .com .ar domain (info.rules)
- 2064752 - ET INFO DYNAMIC_DNS HTTP Request to a *.insuter .com .ar domain (info.rules)
- 2064753 - ET INFO DYNAMIC_DNS Query to a *.gauravn .com .np domain (info.rules)
- 2064754 - ET INFO DYNAMIC_DNS HTTP Request to a *.gauravn .com .np domain (info.rules)
- 2064755 - ET INFO DYNAMIC_DNS Query to a *.vlaves .bg domain (info.rules)
- 2064756 - ET INFO DYNAMIC_DNS HTTP Request to a *.vlaves .bg domain (info.rules)
- 2064757 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (yunded .com) (malware.rules)
- 2064758 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (yunded .com) in TLS SNI (malware.rules)
- 2064759 - ET HUNTING Powershell ScheduledTasks cmdlet New-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064760 - ET HUNTING Powershell ScheduledTasks cmdlet Register-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064761 - ET HUNTING Powershell ScheduledTasks cmdlet Set-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064762 - ET HUNTING Powershell ScheduledTasks cmdlet Enable-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064763 - ET HUNTING Powershell ScheduledTasks cmdlet Disable-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064764 - ET HUNTING Powershell ScheduledTasks cmdlet Get-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064765 - ET HUNTING Powershell ScheduledTasks cmdlet Start-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064766 - ET HUNTING Powershell ScheduledTasks cmdlet Stop-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064767 - ET HUNTING Powershell ScheduledTasks cmdlet Unregister-ScheduledTask command in HTTP Body Response (hunting.rules)
- 2064768 - ET EXPLOIT_KIT LandUpdate808 Domain in DNS Lookup (mersinet .com) (exploit_kit.rules)
- 2064769 - ET EXPLOIT_KIT LandUpdate808 Domain in DNS Lookup (joebesser .com) (exploit_kit.rules)
- 2064770 - ET EXPLOIT_KIT LandUpdate808 Domain in TLS SNI (mersinet .com) (exploit_kit.rules)
- 2064771 - ET EXPLOIT_KIT LandUpdate808 Domain in TLS SNI (joebesser .com) (exploit_kit.rules)
- 2064772 - ET MALWARE TA569 Gholoader CnC Domain in DNS Lookup (edge .lugerd .com) (malware.rules)
- 2064773 - ET MALWARE TA569 Gholoader CnC Domain in DNS Lookup (alpha .lugerd .com) (malware.rules)
- 2064774 - ET MALWARE FrigidBackdoor Exfil Victim Machine Profile (malware.rules)
- 2064775 - ET MALWARE FrigidBackdoor Checkin (malware.rules)
Pro:
- 2864600 - ETPRO EXPLOIT_KIT Observed DNS Query to ClearFake Domain (exploit_kit.rules)
- 2864601 - ETPRO EXPLOIT_KIT Observed ClearFake Domain in TLS SNI (exploit_kit.rules)
- 2864602 - ETPRO ATTACK_RESPONSE Observed ClearFake JavaScript Inject (attack_response.rules)
Modified inactive rules:
- 2030366 - ET JA3 Hash - Possible POSHC2 Client CnC (ja3.rules)
- 2030367 - ET JA3 Hash - Possible POSHC2 Server Response (ja3.rules)
- 2030377 - ET MALWARE Operation Interception Payload CnC Checkin (malware.rules)
- 2030520 - ET INFO Suspicious HTTP GET Request on Port 53 Outbound (info.rules)
- 2030522 - ET INFO Suspicious HTTP POST Request on Port 53 Outbound (info.rules)
- 2030523 - ET INFO Suspicious HTTP POST Request on Port 53 Inbound (info.rules)
- 2030528 - ET MALWARE EvilNum CnC Client Data Exfil (malware.rules)
- 2030555 - ET INFO Outbound RRSIG DNS Query Observed (info.rules)
- 2030614 - ET MALWARE Observed Malicious SSL Cert (Lazarus APT MalDoc DL 2020-07-30) (malware.rules)
- 2030728 - ET MALWARE Suspected Zebrocy Downloader Traffic (malware.rules)
- 2843255 - ETPRO MALWARE Observed Malicious SSL Cert (AZORult CnC) (malware.rules)
- 2843260 - ETPRO MALWARE Observed Malicious SSL Cert (AZORult CnC) (malware.rules)
- 2843276 - ETPRO MALWARE Observed SocGholish Domain in TLS SNI (malware.rules)
- 2843287 - ETPRO MALWARE Observed SocGholish Domain in TLS SNI (malware.rules)
- 2843643 - ETPRO MALWARE Observed SocGholish Domain in TLS SNI (malware.rules)
- 2843654 - ETPRO MALWARE Observed SocGholish Domain in TLS SNI (malware.rules)
- 2843727 - ETPRO HUNTING Kerberos Principal Unknown Flood (hunting.rules)
- 2844189 - ETPRO MALWARE CaptainCha CnC in DNS Lookup (malware.rules)
- 2844190 - ETPRO MALWARE CaptainCha CnC in DNS Lookup (malware.rules)
- 2844195 - ETPRO MALWARE CaptainCha CnC in DNS Lookup (malware.rules)
- 2844196 - ETPRO MALWARE CaptainCha CnC in DNS Lookup (malware.rules)
- 2844198 - ETPRO MALWARE CaptainCha CnC in DNS Lookup (malware.rules)
Disabled and modified rules:
- 2064267 - ET MALWARE TA569 Staging Server Domain in DNS Lookup (prototypechain .com) (malware.rules)
- 2064270 - ET MALWARE TA569 Staging Server Domain in TLS SNI (prototypechain .com) (malware.rules)