Summary:
6 new OPEN, 22 new PRO (6 + 16)
Thanks @haxrob
Added rules:
Open:
- 2065032 - ET EXPLOIT_KIT Malicious TA2726 TDS Domain in DNS Lookup (content-website-analytics .comm) (exploit_kit.rules)
- 2065033 - ET EXPLOIT_KIT Malicious TA2726 TDS Domain in TLS SNI (content-website-analytics .comm) (exploit_kit.rules)
- 2065034 - ET WEB_SPECIFIC_APPS ABB Cylon Aspect 3.07.00 Remote Code Execution (web_specific_apps.rules)
- 2065035 - ET ATTACK_RESPONSE Braodo Loader Inbound (attack_response.rules)
- 2065036 - ET USER_AGENTS TruffleHog Repo Scanner User-Agent (TruffleHog3) (user_agents.rules)
- 2065037 - ET WEB_SPECIFIC_APPS Palo Alto GlobalProtect Directory Traversal in Session Cookie (CVE-2024-3400) (web_specific_apps.rules)
Pro:
- 2864730 - ETPRO MALWARE Win32/XWorm V2 CnC Command - PING Outbound (malware.rules)
- 2864731 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound (malware.rules)
- 2864732 - ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound (malware.rules)
- 2864733 - ETPRO MALWARE Win32/XWorm V2 CnC Command - RD- Inbound (malware.rules)
- 2864734 - ETPRO MALWARE Win32/XWorm V3 CnC Command - sendPlugin Outbound (malware.rules)
- 2864735 - ETPRO MALWARE Win32/XWorm V3 CnC Command - Informations Outbound (malware.rules)
- 2864736 - ETPRO MALWARE Win32/XWorm V3 CnC Command - GetInformations Inbound (malware.rules)
- 2864737 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PCShutdown Inbound (malware.rules)
- 2864738 - ETPRO MALWARE Win32/XWorm V2 CnC Command - PING Outbound (malware.rules)
- 2864739 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound (malware.rules)
- 2864740 - ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound (malware.rules)
- 2864741 - ETPRO MALWARE Win32/XWorm V2 CnC Command - RD- Inbound (malware.rules)
- 2864742 - ETPRO MALWARE Win32/XWorm V3 CnC Command - sendPlugin Outbound (malware.rules)
- 2864743 - ETPRO MALWARE Win32/XWorm V3 CnC Command - Informations Outbound (malware.rules)
- 2864744 - ETPRO MALWARE Win32/XWorm V3 CnC Command - GetInformations Inbound (malware.rules)
- 2864745 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PCShutdown Inbound (malware.rules)
Modified inactive rules:
- 2001066 - ET MALWARE IE Ilookup Trojan (malware.rules)
- 2001481 - ET ADWARE_PUP MediaTickets Spyware Install (adware_pup.rules)
- 2001503 - ET ADWARE_PUP Medialoads.com Spyware Config (adware_pup.rules)
- 2001517 - ET ADWARE_PUP Websearch.com Outbound Dialer Retrieval (adware_pup.rules)
- 2001530 - ET ADWARE_PUP ak-networks.com Spyware Code Download (adware_pup.rules)
- 2002036 - ET ADWARE_PUP Weird on the Web /180 Solutions Checkin (adware_pup.rules)
- 2002838 - ET POLICY Google Search Appliance browsing the Internet (policy.rules)
- 2002867 - ET WEB_SPECIFIC_APPS Horde 3.0.9-3.1.0 Help Viewer Remote PHP Exploit (web_specific_apps.rules)
- 2002868 - ET WEB_SPECIFIC_APPS Horde Web Mail Help Access (web_specific_apps.rules)
- 2003219 - ET ADWARE_PUP Alexa Spyware Reporting (adware_pup.rules)
- 2003585 - ET ADWARE_PUP Trojan User-Agent (Windows Updates Manager) (adware_pup.rules)
- 2003606 - ET ADWARE_PUP Alexa Spyware Reporting URL Visited (adware_pup.rules)
- 2003619 - ET ADWARE_PUP Alexa Spyware Redirecting User (adware_pup.rules)
- 2003641 - ET MALWARE Downloader.Small User Agent Detected (NetScafe) (malware.rules)
- 2006398 - ET MALWARE Socks666 Checkin Packet (malware.rules)
- 2006399 - ET MALWARE Socks666 Checkin Success Packet (malware.rules)
- 2007595 - ET MALWARE Downloader.Dluca HTTP Checkin (malware.rules)
- 2007898 - ET MALWARE Sohanad Checkin via HTTP (malware.rules)
- 2008236 - ET MALWARE Fake.Googlebar or Softcash.org Related Post-Infection Checkin (malware.rules)
- 2008652 - ET WEB_SPECIFIC_APPS ScriptsEz Easy Image Downloader id File Disclosure (web_specific_apps.rules)
- 2009077 - ET MALWARE TROJ_INJECT.NI Update Request (malware.rules)
- 2009244 - ET ATTACK_RESPONSE Cisco TclShell TFTP Read Request (attack_response.rules)
- 2009246 - ET SHELLCODE Bindshell2 Decoder Shellcode (shellcode.rules)
- 2009398 - ET WEB_SPECIFIC_APPS HoMaP plugin_admin.php _settings Parameter Remote File Inclusion (web_specific_apps.rules)
- 2009435 - ET WEB_SPECIFIC_APPS e107 123 FlashChat Module 123flashchat.php e107path Parameter Remote File Inclusion (web_specific_apps.rules)
- 2009504 - ET WEB_SPECIFIC_APPS Quantum Game Library smarty.inc.php CONFIG Parameter Remote File Inclusion (web_specific_apps.rules)
- 2009723 - ET WEB_SPECIFIC_APPS QuickTeam qte_web.php qte_web_path Parameter Remote File Inclusion (web_specific_apps.rules)
- 2009812 - ET MALWARE AVKiller with Backdoor checkin (malware.rules)
- 2009884 - ET SCAN Unusually Fast 400 Error Messages (Bad Request), Possible Web Application Scan (scan.rules)
- 2009885 - ET SCAN Unusually Fast 404 Error Messages (Page Not Found), Possible Web Application Scan/Directory Guessing Attack (scan.rules)
- 2010329 - ET ACTIVEX COM Object MS06-042 CLSID 38 Access Attempt (activex.rules)
- 2010330 - ET ACTIVEX COM Object MS06-042 CLSID 39 Access Attempt (activex.rules)
- 2010331 - ET ACTIVEX COM Object MS06-042 CLSID 40 Access Attempt (activex.rules)
- 2010332 - ET ACTIVEX COM Object MS06-042 CLSID 41 Access Attempt (activex.rules)
- 2010452 - ET MALWARE Potential Fake AV GET installer.1.exe (malware.rules)
- 2010453 - ET MALWARE Potential Fake AV GET installer_1.exe (malware.rules)
- 2010465 - ET MALWARE Potential Fake AV Download (download/install.php) (malware.rules)
- 2011988 - ET EXPLOIT_KIT Phoenix-style Exploit Kit Java Request with semicolon in URI (exploit_kit.rules)
- 2011989 - ET MALWARE Suspicious executable download adobe-flash.v (malware.rules)
- 2011991 - ET MALWARE FAKEAV Gemini systempack exe download (malware.rules)
- 2012192 - ET ACTIVEX NewV SmartClient NewvCommon.ocx DelFile Method Arbitrary File Deletion Attempt (activex.rules)
- 2012621 - ET EXPLOIT Adobe Flash SWF File Embedded in XLS FILE Caution - Could be Exploit (exploit.rules)
- 2012622 - ET CURRENT_EVENTS Adobe Flash Unicode SWF File Embedded in Office File Caution - Could be Hostile (current_events.rules)
- 2012839 - ET MALWARE Trojan-Downloader.Win32.Small Checkin (malware.rules)
- 2013285 - ET MALWARE DarkComet-RAT Client Keepalive (malware.rules)
- 2013999 - ET ADWARE_PUP W32/Adware.Ibryte User-Agent (ic Windows NT 5.1 MSIE 6.0 Firefox/ Def) (adware_pup.rules)
- 2014437 - ET MALWARE FakeAV Landing Page - Initializing Protection System (malware.rules)
- 2014605 - ET ADWARE_PUP W32/GameVance Adware Server Reponse To Client Checkin (adware_pup.rules)
- 2014606 - ET ADWARE_PUP W32/GameVance User-Agent (aw v3) (adware_pup.rules)
- 2017176 - ET WEB_SERVER Possible Apache Struts OGNL Command Execution CVE-2013-2251 action (web_server.rules)
- 2018208 - ET DOS Inbound GoldenEye DoS attack (dos.rules)
- 2018209 - ET EXPLOIT_KIT Rawin EK Java fakav.jar (exploit_kit.rules)
- 2018466 - ET MALWARE Possible Backdoor.Unrecom Download (malware.rules)
- 2018568 - ET CURRENT_EVENTS Possible Inbound SNMP Router DoS (TTL 1) (current_events.rules)
- 2018573 - ET EXPLOIT_KIT Safe/CritX/FlashPack EK Secondary Landing (exploit_kit.rules)
- 2019516 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Backoff CnC) (malware.rules)
- 2019517 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC) (malware.rules)
- 2020296 - ET MALWARE Scieron Retrieving Information (malware.rules)
- 2020864 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC) (malware.rules)
- 2021112 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex CnC) (malware.rules)
- 2021113 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC) (malware.rules)
- 2022252 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Gozi MITM) (malware.rules)
- 2022364 - ET WEB_CLIENT Fake Virus Phone Scam Landing Jan 13 M1 (web_client.rules)
- 2022707 - ET MALWARE LuminosityLink - Data Channel Client Request 2 (malware.rules)
- 2022709 - ET MALWARE LuminosityLink - CnC Password Exfil (malware.rules)
- 2023157 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Vawtrak CnC) (malware.rules)
- 2023538 - ET MALWARE ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Tuhkit C2) (malware.rules)
- 2023539 - ET MALWARE ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gozi MITM) (malware.rules)
- 2023540 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Vawtrak CnC) (malware.rules)
- 2023541 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (TrickBot CnC) (malware.rules)
- 2024205 - ET MALWARE Win32/Cradle Ransomware Onion Domain (malware.rules)
- 2027697 - ET MALWARE VBA/TrojanDownloader.Agent.PAC Retreiving Malicious VBScript (malware.rules)
- 2100292 - GPL NETBIOS x86 Linux samba overflow (netbios.rules)
- 2100517 - GPL MISC xdmcp query (misc.rules)
- 2100567 - GPL SMTP SMTP relaying denied (smtp.rules)
- 2101311 - GPL INAPPROPRIATE hardcore anal (inappropriate.rules)
- 2101419 - GPL SNMP trap udp (snmp.rules)
- 2102018 - GPL RPC mountd TCP dump request (rpc.rules)
- 2103033 - GPL NETBIOS SMB-DS NT Trans NT CREATE unicode andx SACL overflow attempt (netbios.rules)
- 2103049 - GPL NETBIOS SMB-DS NT Trans NT CREATE unicode andx invalid SACL ace size dos attempt (netbios.rules)
- 2103057 - GPL NETBIOS SMB-DS NT Trans NT CREATE unicode andx invalid SACL ace size dos attempt (netbios.rules)
- 2103195 - GPL NETBIOS name query overflow attempt TCP (netbios.rules)
- 2800070 - ETPRO EXPLOIT CA Multiple Products Console Server Login Credentials Handling Buffer Overflow 4 (exploit.rules)
- 2800071 - ETPRO EXPLOIT Symantec Discovery XFERWAN Service Buffer Overflow (exploit.rules)
- 2800072 - ETPRO DOS Linux Kernel NetFilter SCTP Unknown Chunk Types Denial of Service 1 (dos.rules)
- 2800322 - ETPRO VOIP Asterisk Invalid RTP Payload Type Number Memory Corruption 2 (voip.rules)
- 2800325 - ETPRO EXPLOIT GNOME Project libxslt Library RC4 Key String Buffer Overflow 1 (exploit.rules)
- 2800326 - ETPRO EXPLOIT GNOME Project libxslt Library RC4 Key String Buffer Overflow 2 (exploit.rules)
- 2800327 - ETPRO EXPLOIT GNOME Project libxslt Library RC4 Key String Buffer Overflow 3 (exploit.rules)
- 2800581 - ETPRO EXPLOIT HP OpenView Network Node Manager webappmon.exe execvp_nc Buffer Overflow (exploit.rules)
- 2800582 - ETPRO WEB_SERVER Novell Teaming ajaxUploadImageFile Remote Code Execution (web_server.rules)
- 2801138 - ETPRO SCADA SCHWEITZER SEL2032-Access Level 1/2 Password Changed (scada.rules)
- 2801139 - ETPRO SCADA SCHWEITZER SEL2032-Access Level 1 or 2 Password Disabled (scada.rules)
- 2801141 - ETPRO SCADA SCHWEITZER SEL2032-Time Change was Successful (scada.rules)
- 2801378 - ETPRO NETBIOS Microsoft Windows Active Directory BROWSER ELECTION Buffer Overflow Internal CIFS (CVE-2011-0654) (netbios.rules)
- 2801948 - ETPRO MALWARE PC Total Defender or related Fake AV Checkin (malware.rules)
- 2802094 - ETPRO MALWARE Trojan.Win32.TMaquina.A Checkin (malware.rules)
- 2802585 - ETPRO MALWARE Backdoor.Win32.Kadrbot.A Checkin (malware.rules)
- 2802862 - ETPRO EXPLOIT HP Intelligent Management Center imcsyslogdm Use After Free (exploit.rules)
- 2802970 - ETPRO ACTIVEX Tom Sawyer GET Extension Factory COM Object Instantiation Memory Corruption 3 (activex.rules)
- 2802971 - ETPRO MALWARE Killproc.5707/Generic Checkin Request 1 (malware.rules)
- 2803192 - ETPRO EXPLOIT HP OpenView Storage Data Protector Stack Overflow (Published Expoit) (exploit.rules)
- 2803358 - ETPRO EXPLOIT Sybase Open Server Function Pointer Array Code Execution 2 (exploit.rules)
- 2803359 - ETPRO EXPLOIT Sybase Open Server Function Pointer Array Code Execution 3 (exploit.rules)
- 2803677 - ETPRO MALWARE Trojan.Win32.Mybios.A Checkin (malware.rules)
- 2803983 - ETPRO ACTIVEX Oracle Hyperion Strategic Finance 12.x Tidestone Formula One WorkBook OLE Control TTF16.ocx Remote Heap Overflow (activex.rules)
- 2804273 - ETPRO MALWARE Win32/Bancos.ACM Checkin (malware.rules)
- 2804446 - ETPRO MALWARE Win32/Votead Checkin (malware.rules)
- 2804448 - ETPRO MALWARE Trojan.Zlob Install (malware.rules)
- 2804596 - ETPRO MALWARE Trojan-Banker.Win32.Banbra.anwx Checkin (malware.rules)
- 2804598 - ETPRO ADWARE_PUP Win32.Adware-gen Install (adware_pup.rules)
- 2804599 - ETPRO ADWARE_PUP Win32/Adware.Kraddare.DB Install (adware_pup.rules)
- 2804811 - ETPRO MALWARE P2P-Worm.Win32.Palevo.boxg Checkin (malware.rules)
- 2805172 - ETPRO MALWARE W32/Downloader.BEMB.dropper Checkin (malware.rules)
- 2805173 - ETPRO MALWARE Trojan-PSW.Win32.Agent.ozr Checkin (malware.rules)
- 2805174 - ETPRO MALWARE W32/Banbra.ASYO!tr Checkin (malware.rules)
- 2805223 - ETPRO MALWARE W32/Scar.GKKK!tr Checkin (malware.rules)
- 2805355 - ETPRO MALWARE POST to a gif file (malware.rules)
- 2805356 - ETPRO MALWARE POST to a bmp file (malware.rules)
- 2805504 - ETPRO MALWARE W32/Banload.RCI!tr.dldr Checkin (malware.rules)
- 2805668 - ETPRO ADWARE_PUP Generic PUP.x!vi!1B41AF78BF55 Checkin (adware_pup.rules)
- 2805669 - ETPRO MALWARE TROJ_DLOADER.ANP Checkin (malware.rules)
- 2805671 - ETPRO MALWARE Variant.Barys.1820 Checkin (malware.rules)
- 2805836 - ETPRO MALWARE ponmocup Checkin 1 (malware.rules)
- 2805837 - ETPRO MALWARE ponmocup Checkin 2 (malware.rules)
- 2805879 - ETPRO MALWARE W32/Koobface.hcy CnC response (malware.rules)
- 2806312 - ETPRO MALWARE Win32/Spy.Bancos.OUH Checkin (malware.rules)
- 2806822 - ETPRO WEB_SERVER ADFS Service Account Leak CVE-2013-3185 (web_server.rules)
- 2806823 - ETPRO DOS ICMP with truncated IPv6 header CVE-2013-3182 (dos.rules)
- 2806824 - ETPRO DOS ICMP with truncated IPv6 header CVE-2013-3182 (dos.rules)
- 2806970 - ETPRO WEB_SERVER Microsoft SharePoint DoS 1 CVE-2013-0081 (web_server.rules)
- 2807108 - ETPRO MALWARE Trojan-Banker.Win32.Banbra.aztd Response (malware.rules)
- 2807476 - ETPRO MALWARE Win32/TrojanDownloader.Onkods.V Download (malware.rules)
- 2807477 - ETPRO MALWARE Trojan-Downloader.Win32.Agent.bofr Checkin (malware.rules)
- 2807621 - ETPRO MALWARE Zegost.Gen CnC (OUTBOUND) (malware.rules)
- 2808038 - ETPRO WEB_CLIENT Microsoft Internet Explorer Use After free (CVE-2014-0310) (web_client.rules)
- 2808357 - ETPRO MOBILE_MALWARE Android/TelMan.A Checkin (mobile_malware.rules)
- 2809072 - ETPRO MALWARE Win32.RShot Checkin (malware.rules)
- 2809268 - ETPRO MALWARE W32/PVZ-In Checkin (Operation Cleaver) (malware.rules)
- 2809463 - ETPRO MOBILE_MALWARE Trojan-Banker.AndroidOS.Svpeng.c Checkin (mobile_malware.rules)
- 2810150 - ETPRO MALWARE Exaction Cryptolocker .onion Proxy Domain (iupfnqg2uaigwoei) (malware.rules)
- 2810151 - ETPRO MALWARE Trojan-Spy.Win32.Zbot.urtu .onion Proxy Domain (4tsur32luets6fhe) (malware.rules)
- 2810846 - ETPRO MOBILE_MALWARE Android.Riskware.SmsPay.C Checkin 8 (mobile_malware.rules)
- 2811579 - ETPRO MALWARE Malicious SSL certificate detected (Meterpreter) (malware.rules)
- 2812156 - ETPRO MALWARE MSIL/Mictanort.A Checkin (malware.rules)
- 2816316 - ETPRO MALWARE Win32/Agent.XRA (Robo) DNS Lookup (malware.rules)
- 2816318 - ETPRO MALWARE Win32/Agent.XRA (Robo) DNS Lookup (malware.rules)
- 2820961 - ETPRO MOBILE_MALWARE Trojan-Downloader.AndroidOS.Boqx.a Checkin 2 (mobile_malware.rules)
- 2821411 - ETPRO MOBILE_MALWARE Android/SLocker.AC Checkin (mobile_malware.rules)
- 2825391 - ETPRO EXPLOIT Possible Scripting Engine Information Disclosure Vulnerability (CVE-2017-0049) (exploit.rules)
- 2825762 - ETPRO MOBILE_MALWARE Trojan-Banker.AndroidOS.Asacub.a Checkin 19 (mobile_malware.rules)
Disabled and modified rules:
- 2065028 - ET EXPLOIT_KIT LandUpdate808 Domain in DNS Lookup (aeropeics .com) (exploit_kit.rules)
- 2065029 - ET EXPLOIT_KIT LandUpdate808 Domain in TLS SNI (aeropeics .com) (exploit_kit.rules)