Weekly Detection Rule (YARA and Snort) Information – Week 4, June 2024

Weekly Detection Rule (YARA and Snort) Information – Week 4, June 2024

The following is the information on Yara and Snort rules (week 4, June 2024) collected and shared by the AhnLab TIP service.

  • 8 YARA Rules
Detection name Description Source
malware_cobaltstrike_workersdevloader Detects a CobaltStrike loader https://github.com/JPCERTCC/jpcert-yara
Kimsuky_downloader_vbs Detects Kimsuky VBS file downloader Powershell https://github.com/JPCERTCC/jpcert-yara
Kimsuky_PokDoc_ps1 Detects Kimsuky device information collection Powershell https://github.com/JPCERTCC/jpcert-yara
Kimsuky_InfoKey_ps1 Detects Kimsuky keylogger Powershell https://github.com/JPCERTCC/jpcert-yara
malware_DOPLUGS Detects DOPLUGS https://github.com/JPCERTCC/jpcert-yara
malware_DOPLUGSLoader Detects DOPLUGS loader https://github.com/JPCERTCC/jpcert-yara
malware_webrcs_lnk Detects WEBRCS executable LNK files https://github.com/JPCERTCC/jpcert-yara
malware_webrcs Detects WEBRCS https://github.com/JPCERTCC/jpcert-yara
  • 14 Snort Rules
Detection name Description Source
ET EXPLOIT HikVision Arbitrary Directory Traversal Attempt Detects HikVision arbitrary file reading vulnerability attempt packet https://rules.emergingthreatspro.com/open/
ET TROJAN Win32/ProcessKiller CnC Initialization M2 Detects ProcessKiller C2 connection packet https://rules.emergingthreatspro.com/open/
ET TROJAN ClickFix CnC Activity (POST) Detects CLickFix C2 connection packet https://rules.emergingthreatspro.com/open/
ET TROJAN ClickFix Obfuscated Payload Inbound Detects ClickFix obfuscation payload incoming packet https://rules.emergingthreatspro.com/open/
ET TROJAN Fickle Stealer C2 Server Tasking Detects Fickle Stealer C2 connection packet https://rules.emergingthreatspro.com/open/
ET TROJAN Suspected Powershell Empire Activity M1 Detects Powershell Empire packet https://rules.emergingthreatspro.com/open/
ET TROJAN Suspected Powershell Empire Activity M2 Detects Powershell Empire packet https://rules.emergingthreatspro.com/open/
ET TROJAN Suspected Powershell Empire Activity M3 Detects Powershell Empire packet https://rules.emergingthreatspro.com/open/
ET TROJAN [ANY.RUN] NjRat (tXRAT v.2.3R) Client Sends State Active Window Detects NjRat packet https://rules.emergingthreatspro.com/open/
ET TROJAN [ANY.RUN] NjRat (tXRAT v.2.3R) Server Sends Plugin to Client Detects NjRat packet https://rules.emergingthreatspro.com/open/
ET TROJAN [ANY.RUN] NjRat (tXRAT v.2.3R) Client Sends Check-in Packet Detects NjRat packet https://rules.emergingthreatspro.com/open/
ET MOBILE_MALWARE Android Rafel RAT Checkin M2 Detects Rafael RAT C2 connection packet https://rules.emergingthreatspro.com/open/
ET MOBILE_MALWARE Android Rafel RAT Checkin M1 Detects Rafael RAT C2 connection packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT Solarwinds Serv-U Directory Traversal Attempt Inbound (CVE-2024-28995) Detects Solawinds CVE-2024-28995 exploit attempt packet https://rules.emergingthreatspro.com/open/

Detailed rule files are attached.

2024-06_ASEC_Notes_4_snort.rules

2024-06_ASEC_Notes_4.yar