Weekly Detection Rule (YARA and Snort) Information – Week 4, December 2024

Weekly Detection Rule (YARA and Snort) Information – Week 4, December 2024

The following is the information on Yara and Snort rules (week 4, December 2024) collected and shared by the AhnLab TIP service.

  • 5 YARA Rules

Detection name

Description

Source

PK_BankID_poko Phishing Kit impersonating BankID https://github.com/t4d/PhishingKit-Yara-Rules
PK_DisneyPlus_blackforce Phishing Kit impersonating Disney Plus https://github.com/t4d/PhishingKit-Yara-Rules
PK_O365_itna1337 Phishing Kit impersonating Office 365 https://github.com/t4d/PhishingKit-Yara-Rules
PK_BanquePostale_z0n51_2 Phishing Kit impersonating la Banque Postale https://github.com/t4d/PhishingKit-Yara-Rules
PK_antai_inun2 Phishing Kit impersonating French ANTAI (amendes) portal https://github.com/t4d/PhishingKit-Yara-Rules
  • 27 Snort Rules

Detection name

Source

ET TROJAN Zloader User-Agent Observed (PresidentPutin) https://rules.emergingthreatspro.com/open/
ET TROJAN Zloader CnC Activity (POST) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Cleo MFT Arbitrary File Write (CVE-2024-55956) https://rules.emergingthreatspro.com/open/
ET TROJAN XiebroC2 CnC Activity KeepAlive M4 (Outbound) https://rules.emergingthreatspro.com/open/
ET TROJAN XiebroC2 CnC Activity KeepAlive M4 (Inbound) https://rules.emergingthreatspro.com/open/
ET TROJAN XiebroC2 CnC Activity SendInfo M4 (Outbound) https://rules.emergingthreatspro.com/open/
ET TROJAN XiebroC2 CnC Activity Disconnect M4 (Outbound) https://rules.emergingthreatspro.com/open/
ET TROJAN XiebroC2 CnC Activity List Process M4 (Outbound) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Apache Struts2 Path Traversal Attempt Inbound M1 (CVE-2024-53677) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Apache Struts2 Path Traversal Attempt Inbound M2 (CVE-2024-53677) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Draytek mainfunction.cgi cvmcfgupload Command Injection Attempt (CVE-2020-15415) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Draytek mainfunction.cgi trustcaupload Command Injection Attempt (CVE-2023-1162) https://rules.emergingthreatspro.com/open/
ET TROJAN Generic Powershell Loader Using Encryption Routine Inbound https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Draytek mainfunction.cgi commandTable parameter Command Injection Attempt (CVE-2023-24229) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS NUUO NVRmini upgrade_handle.php uploaddir Command Injection Attempt (CVE-2018-14933) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Draytek mainfunction.cgi doCfgExport option Arbitrary File Read Attempt (CVE-2023-1009) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Draytek mainfunction.cgi getSyslogFile option Arbitrary File Read Attempt (CVE-2023-1163) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Draytek mainfunction.cgi dumpSyslog option Arbitrary File Deletion Attempt (CVE-2023-6265) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Fortinet FortiWLM Unauthenticated Command Injection (CVE-2023-34993) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Fortinet FortiWLM Unauthenticated Limited Arbitrary File Read https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Fortinet FortiWLM Authenticated Command Injection (CVE-2023-48782) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Fortinet FortiWLM Unauthenticated Arbitrary File Read (CVE-2023-48783) https://rules.emergingthreatspro.com/open/
ET TROJAN Xenorat Default C2 Server Response Inbound https://rules.emergingthreatspro.com/open/
ET TROJAN Xenorat Default Handshake Inbound https://rules.emergingthreatspro.com/open/
ET EXPLOIT Fortinet FortiClient EMS SQL Injection (CVE-2023-48788) https://rules.emergingthreatspro.com/open/
ET CURRENT_EVENTS Microsoft Windows Contacts Syslink Control href Attribute Escape (CVE-2022-44666) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Craft CMS Template Path Injection RCE (CVE-2024-56145) https://rules.emergingthreatspro.com/open/

2024-12_ASEC_Notes_4.yar

2024-12_ASEC_Notes_4_snort.rules