Weekly Detection Rule (YARA and Snort) Information – Week 3, June 2024

Weekly Detection Rule (YARA and Snort) Information – Week 3, June 2024

The following is the information on Yara and Snort rules (week 3, June 2024) collected and shared by the AhnLab TIP service.
 

  • 10 YARA Rules
Detection name Description Source
PK_DBS_baglan Detects a phishing kit impersonating DBS bank https://github.com/t4d/PhishingKit-Yara-Rules
PK_NatWest_admin Detects a phishing kit impersonating NatWest bank https://github.com/t4d/PhishingKit-Yara-Rules
PK_Postbank_buff Detects a phishing kit impersonating PostBank https://github.com/t4d/PhishingKit-Yara-Rules
PK_RAM_otp Detects a phishing kit impersonating RAM.co.za (transportation) https://github.com/t4d/PhishingKit-Yara-Rules
PK_Telstra_flow Detects a phishing kit impersonating Telstra https://github.com/t4d/PhishingKit-Yara-Rules
PK_Chase_Xbaltiv2 Detects a phishing kit impersonating Chase bank https://github.com/t4d/PhishingKit-Yara-Rules
PK_KeyBank_otp Detects a phishing kit impersonating KeyBank https://github.com/t4d/PhishingKit-Yara-Rules
PK_NavyFederal_Hemsworth Detects a phishing kit impersonating Navy Federal Credit Union (bank for military personnel and their families) https://github.com/t4d/PhishingKit-Yara-Rules
PK_Spotify_antics Detects a phishing kit impersonating Spotify https://github.com/t4d/PhishingKit-Yara-Rules
PK_SwissPass_blackforce Detects a phishing kit impersonating SwissPass https://github.com/t4d/PhishingKit-Yara-Rules
  • 42 Snort Rules
Detection name Description Source
ET EXPLOIT PHP-Live-Chat Get Shell Attempt Inbound Detects PHP-Live-Chat administrator account creation attempt packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT Hongjing eHR Showmedia.jsp SQL Injection Inbound Detects Hongjin eHR SQL Injection attempt packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT NextGen Mirth Connect <4.4.1 RCE Attempt (CVE-2023-43208) Detects NextGen Mirth Connect RCE vulnerability exploit packet https://rules.emergingthreatspro.com/open/
ET TROJAN ClearFlake CnC Activity Outbound (source_id) Detects ClearFlake C2 connection packet https://rules.emergingthreatspro.com/open/
ET TROJAN ClearFlake CnC Checkin (POST) Detects ClearFlake C2 connection packet https://rules.emergingthreatspro.com/open/
ET INFO Suspicious Header Name In HTTP Request (U) Detects suspicious header name packet in HTTP Request https://rules.emergingthreatspro.com/open/
ET CURRENT_EVENTS Telegram QR Code Login Landing Page 2024-06-10 Detects Telegram QR login landing page packet detection https://rules.emergingthreatspro.com/open/
ET CURRENT_EVENTS UEFA EURO 2024 Survey Landing Page 2024-06-11 Detects UEFA EURO 2024 survey landing page packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT UFIDA PLM getWorkGroups Unauthorized Information Access Attempt Detects UFIDA PLM getWorkGroups unauthorized access attempt packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT Zhibang International ERP System SQL Injection Attempt Detects Zhibang International ERP SQL Injection attempt packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT ZhongCheng Kexin Ticket Management System SQLi Attempt Detects ZhongCheng Kexin ticket management system SQL injection attempt packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT JEPaaS Development Platform File Upload Authentication Bypass Detects JEPaas Development Platform file upload authentication bypass packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT Possible Telerik Deserialization Attempt – POST to Vulnerable Path with Specific Extension (CVE-2024-1800) Detects Telerik CVE-2024-1800 vulnerability exploit packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT Possible Telerik Auth Bypass Attempt – Account Creation from External Host (CVE-2024-4358) Detects Telerik CVE-2024-4358 vulnerability exploit packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection (varchar2) in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection CHAR() in HTTP Request Body M1 Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection CHAR() in HTTP Request Body M2 Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection CHR() in HTTP Request Body M1 Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection CHR() in HTTP Request Body M2 Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection sp_configure in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection DELETE FROM in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection INSERT INTO in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection SELECT FROM in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection (varchar) in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection (declare) in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection INTO OUTFILE in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection Obfuscated by REVERSE function in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection SELECT CONCAT in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection SELECT CAST in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection UNION SELECT in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection SELECT CAST in HTTP URI Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL Injection WAITFOR DELAY in HTTP URI Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET WEB_SERVER Possible SQL injection WAITFOR DELAY in HTTP Request Body Detects SQL injection packet https://rules.emergingthreatspro.com/open/
ET CURRENT_EVENTS Generic Survey Credential Phish Landing Page 2024-06-11 Detects credential phishing landing page https://rules.emergingthreatspro.com/open/
ET CURRENT_EVENTS Generic Survey Credential Phish Landing Page 2024-06-12 Detects credential phishing landing page https://rules.emergingthreatspro.com/open/
ET EXPLOIT Dahua DSS Security Management Platform Attempted Privilege Escalation Detects Dahua DSS Security Management Platform privilege escalation attempt packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT Telecommunications Gateway Configuration Management System Unauthenticated File Upload Detects Telecommunications Gateway Configuration Management System unauthorized file upload attempt packet https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Apache OFBiz Directory Traversal Remote Code Execution Attempt (CVE-2024-36104) Detects Apache OFBiz RCE vulnerability (CVE-2024-36104) attempt packet https://rules.emergingthreatspro.com/open/
ET TROJAN [ANY.RUN] Gh0stRAT.Gen Server Response (SweetSpecter) Detects Gh0stRat server response packet https://rules.emergingthreatspro.com/open/
ET CURRENT_EVENTS Generic Credential Phish Landing Page 2024-06-13 Detects credential phishing landing page https://rules.emergingthreatspro.com/open/
ET TROJAN Win64/TrojanDownloader.Agent.AUO User Agent Detects Downloader User Agent https://rules.emergingthreatspro.com/open/

Detailed rule files are attached.

2024-06_ASEC_Notes_3.yar

2024-06_ASEC_Notes_3_snort.rules