Weekly Detection Rule (YARA and Snort) Information – Week 5, August 2024

Weekly Detection Rule (YARA and Snort) Information – Week 5, August 2024

The following is the information on Yara and Snort rules (week 5, August 2024) collected and shared by the AhnLab TIP service.

  • 14 YARA Rules
Detection name Description Source
PK_Chase_prohqcker Phishing Kit impersonating Chase bank https://github.com/t4d/PhishingKit-Yara-Rules
PK_Colissimo_blackforce Phishing Kit impersonating Colissimo https://github.com/t4d/PhishingKit-Yara-Rules
PK_IDME_prohqcker Phishing Kit impersonating ID.me https://github.com/t4d/PhishingKit-Yara-Rules
PK_LCL_2024 Phishing Kit impersonating LCL https://github.com/t4d/PhishingKit-Yara-Rules
PK_Metamask_f528764  Phishing Kit impersonating Metamask https://github.com/t4d/PhishingKit-Yara-Rules
PK_Chase_drfxnd Phishing Kit impersonating Chase bank https://github.com/t4d/PhishingKit-Yara-Rules
PK_Facebook_kasroudra Phishing Kit impersonating Facebook https://github.com/t4d/PhishingKit-Yara-Rules
PK_Instagram_center Phishing Kit impersonating Instagram https://github.com/t4d/PhishingKit-Yara-Rules
PK_Spotify_genius Phishing Kit impersonating Spotify https://github.com/t4d/PhishingKit-Yara-Rules
PK_StandardBank_bcc Phishing Kit impersonating Standard Bank Online Banking https://github.com/t4d/PhishingKit-Yara-Rules
case_26364_cobalt_strike_smb_beacon Case 26364 – file e225857.exe Cobalt Strike SMB beacon https://github.com/The-DFIR-Report/Yara-Rules
case_26364_Get_DataInfo Case 26364 – file Get-DataInfo.ps1 https://github.com/The-DFIR-Report/Yara-Rules
case_26364_socks32_systembc Case 26364 – file socks32.exe SystemBC executable https://github.com/The-DFIR-Report/Yara-Rules
case_26364_qwe Case 26364 – file qwe.exe BlackSuit ransomware binary https://github.com/The-DFIR-Report/Yara-Rules
  • 20 Snort Rules
Detection name Source
ET TROJAN NUMOZYLOD CnC Checkin M1 https://rules.emergingthreatspro.com/open/
ET TROJAN NUMOZYLOD CnC Checkin M2 https://rules.emergingthreatspro.com/open/
ET TROJAN Ailurophile Infostealer Data Exfiltration Attempt M1 https://rules.emergingthreatspro.com/open/
ET TROJAN Ailurophile Infostealer CnC Server Response M1 https://rules.emergingthreatspro.com/open/
ET TROJAN Ailurophile Infostealer Data Exfiltration Attempt M2 https://rules.emergingthreatspro.com/open/
ET TROJAN Ailurophile Infostealer CnC Server Response M2 https://rules.emergingthreatspro.com/open/
ET TROJAN Cobalt Strike Malleable C2 (Amazon Profile) https://rules.emergingthreatspro.com/open/
ET TROJAN Cobalt Strike Malleable C2 (Google Drive Profile) https://rules.emergingthreatspro.com/open/
ET TROJAN Cobalt Strike Malleable C2 (MSNBC Video Profile) https://rules.emergingthreatspro.com/open/
ET TROJAN Cobalt Strike Malleable C2 (Pandora Profile) https://rules.emergingthreatspro.com/open/
ET TROJAN Possible Host Profile Exfiltration In Pipe Delimited Format https://rules.emergingthreatspro.com/open/
ET TROJAN Qwerty Stealer Data Exfiltration Attempt M1 https://rules.emergingthreatspro.com/open/
ET TROJAN BlankGrabber Stealer Exfiltration via Discord https://rules.emergingthreatspro.com/open/
ET TROJAN Qwerty Stealer Data Exfiltration Attempt M2 https://rules.emergingthreatspro.com/open/
ET TROJAN Qwerty Stealer C2 Response https://rules.emergingthreatspro.com/open/
ET TROJAN Possible RAZR Ransomware User-Agent Observed https://rules.emergingthreatspro.com/open/
ET TROJAN RAZR Ransomware CnC Checkin https://rules.emergingthreatspro.com/open/
ET TROJAN Cheana Stealer CnC Checkin https://rules.emergingthreatspro.com/open/
ET TROJAN Cheana Stealer Data Exfiltration Attempt https://rules.emergingthreatspro.com/open/
ET TROJAN ELF/crond CnC Request (GET) https://rules.emergingthreatspro.com/open/

 

2024-08_ASEC_Notes_5_snort.rules

2024-08_ASEC_Notes_5.yar