Weekly Detection Rule (YARA and Snort) Information – Week 3, July 2024

Weekly Detection Rule (YARA and Snort) Information – Week 3, July 2024

The following is the information on Yara and Snort rules (week 3, July 2024) collected and shared by the AhnLab TIP service.

  • 14 YARA Rules
Detection name Description Source
PK_Coinbase_haxornomercy Phishing Kit impersonating Coinbase https://github.com/t4d/PhishingKit-Yara-Rules
PK_Netflix_access Phishing Kit impersonating Netflix https://github.com/t4d/PhishingKit-Yara-Rules
PK_RedstoneFCU_forge Phishing Kit impersonating Redstone Federal Credit Union https://github.com/t4d/PhishingKit-Yara-Rules
PK_TelekomDE_result Phishing Kit impersonating Telekom Deutschland GmbH/T-Online https://github.com/t4d/PhishingKit-Yara-Rules
PK_TexomaCU_prohqcker Phishing Kit impersonating Texoma Community Credit Union https://github.com/t4d/PhishingKit-Yara-Rules
PK_Interac_bore3da Phishing Kit impersonating Interac, several payment systems https://github.com/t4d/PhishingKit-Yara-Rules
PK_Ionos_02d0 Phishing Kit impersonating Ionos webmail https://github.com/t4d/PhishingKit-Yara-Rules
PK_LibertyFreightDelivery_express Phishing Kit impersonating Liberty Freight Delivery company https://github.com/t4d/PhishingKit-Yara-Rules
PK_PNC_lom Phishing Kit impersonating PNC online bank https://github.com/t4d/PhishingKit-Yara-Rules
PK_VystarCU_mrweebee Phishing Kit impersonating VYSTAR CU https://github.com/t4d/PhishingKit-Yara-Rules
APT_MAL_APT27_Rshell_Jul24 YARA rule to detect RSHELL of APT27 https://github.com/Neo23x0/signature-base
SUSP_BAT_OBFUSC_Jul24_1 Detects indicators of obfuscation in Windows Batch files https://github.com/Neo23x0/signature-base
SUSP_BAT_OBFUSC_Jul24_2 Detects indicators of obfuscation in Windows Batch files https://github.com/Neo23x0/signature-base
SUSP_BAT_OBFUSC_Jul24_3 Detects indicators of obfuscation in Windows Batch files https://github.com/Neo23x0/signature-base
  • 8 Snort Rules
Detection name Source
ET INFO Server Responded with Vulnerable OpenSSH Version (CVE-2024-6409) https://rules.emergingthreatspro.com/open/
ET EXPLOIT Splunk Unauthenticated Path Traversal Attempt Inbound (CVE-2024-36991) https://rules.emergingthreatspro.com/open/
ET TROJAN ZharkBot User-Agent Observed https://rules.emergingthreatspro.com/open/
ET TROJAN ZharkBot CnC Exfil in HTTP URI https://rules.emergingthreatspro.com/open/
ET TROJAN [ANY.RUN] MetaStealer v.5 (MC-NMF TLS Server Certificate) https://rules.emergingthreatspro.com/open/
ET EXPLOIT Rejetto HTTP File Server Unauthenticated RCE Attempt (CVE-2024-23692) https://rules.emergingthreatspro.com/open/
ET TROJAN Imposter Interpol Stealer CnC Checkin https://rules.emergingthreatspro.com/open/
ET TROJAN IP Scanner Tool Update Request (GET) https://rules.emergingthreatspro.com/open/

Detailed rule files are attached.

2024-07_ASEC_Notes_3_snort.rules

2024-07_ASEC_Notes_3.yar