Weekly Detection Rule (YARA and Snort) Information – Week 2, June 2024

Weekly Detection Rule (YARA and Snort) Information – Week 2, June 2024

The following is the information on Yara and Snort rules (week 2, June 2024) collected and shared by the AhnLab TIP service.
 

  • 5 YARA Rules
     
Detection Name Description Source
PK_AdobePDF_nayfercrax Detects a phishing kit impersonating Adobe PDF Online https://github.com/t4d/PhishingKit-Yara-Rules
PK_BankOfAmerica_xsmayer Detects a phishing kit impersonating Bank Of America https://github.com/t4d/PhishingKit-Yara-Rules
PK_Ionos_keyword Detects a phishing kit impersonating Ionos (German hosting provider) https://github.com/t4d/PhishingKit-Yara-Rules
PK_MyGovAU_prohqcker2 Detects a phishing kit impersonating Australian myGov https://github.com/t4d/PhishingKit-Yara-Rules
PK_SocieteGenerale_fnetwork Detects a phishing kit impersonating Societe Generale (French financial service group) https://github.com/t4d/PhishingKit-Yara-Rules
  • 8 Snort Rules
Detection Name Description Source
ET TROJAN Win32/Imposter 360 Internet Protection Activity (GET) Detects a network packet impersonating 360 Internet Protection https://rules.emergingthreatspro.com/open/
ET TROJAN Spyder Loader CnC Checkin Detects Spyder Loader C2 connection packet https://rules.emergingthreatspro.com/open/
ET TROJAN UNC1151 Payload Retrieval Attempt Detects UNC1151 payload query attempt https://rules.emergingthreatspro.com/open/
ET TROJAN Silverfox Payload Retrieval Attempt Detects Silverfox payload query attempt https://rules.emergingthreatspro.com/open/
ET TROJAN Win32/OfferCore Checkin M1 Detects OfferCore C2 connection packet https://rules.emergingthreatspro.com/open/
ET TROJAN Win32/OfferCore Checkin M2 Detects OfferCore C2 connection packet https://rules.emergingthreatspro.com/open/
ET TROJAN HTTP Request to URL Ending in Payload .bin Detects /payload{0,5}.bin conection packet https://rules.emergingthreatspro.com/open/
ET EXPLOIT HikVision iSecure Center RCE Attempt Inbound Detects HikVision iSecure Center RCE exploit packet https://rules.emergingthreatspro.com/open/

Detaile rule files are attached.

2024-06_ASEC_Notes_2.yar

2024-06_ASEC_Notes_2_snort.rules