Weekly Detection Rule (YARA and Snort) Information – Week 5, January 2025

Weekly Detection Rule (YARA and Snort) Information – Week 5, January 2025

The following is the information on Yara and Snort rules (week 5, January 2025) collected and shared by the AhnLab TIP service.

  • 8 YARA Rules

Detection name

Description

Source

PK_DHL_Tracking Phishing Kit impersonating DHL https://github.com/t4d/PhishingKit-Yara-Rules
PK_ESL_sigmadev Phishing Kit impersonating ESL Federal Credit Union https://github.com/t4d/PhishingKit-Yara-Rules
PK_Nexi_mobile Phishing Kit impersonating Nexi (Nexi Pay) https://github.com/t4d/PhishingKit-Yara-Rules
PK_PeapackBank_gate Phishing Kit impersonating Peapack-Gladstone bank https://github.com/t4d/PhishingKit-Yara-Rules
PK_WellsFargo_RD265 Phishing Kit impersonating Wells Fargo https://github.com/t4d/PhishingKit-Yara-Rules
SUSP_LNX_ByteEncoder_Jan25 Detects Linux binaries that encode bytes by splitting them into upper and lower nibbles and mapping them to custom lookup tables, seen being used by SEASPY and Bluez backdoors https://github.com/Neo23x0/signature-base
SUSP_LNX_StackString_Technique_Jan25 Detects suspicious Linux binaries using stack-based string manipulation techniques, which are often used to generate PTY (pseudo-terminal) device names for stealth or persistence, seen being used by SEASPY and Bluez backdoors https://github.com/Neo23x0/signature-base
SUSP_LNK_Suspicious_Folders_Jan25 Detects link files (.LNK) with suspicious folders mentioned in the target path https://github.com/Neo23x0/signature-base
  • 11 Snort Rules

Detection name

Source

ET USER_AGENTS FastHTTP User-Agent Observed Outbound (fasthttp) https://rules.emergingthreatspro.com/open/
ET DOS Possible Brute Force Attack Using FastHTTP https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Progress WhatsUp Gold SnmpExtendedActiveMonitor Path Traversal Vulnerability (CVE-2024-12105) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Nuuo NVRmini/NVRsolo handle_import_user.php Unauthenticated Remote Code Execution Attempt (CVE-2022-23227) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Axis Communications Security Camera Command Injection Attempt (CVE-2018-10660) M1 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Axis Communications Security Camera Command Injection Attempt (CVE-2018-10660, CVE-2018-10661, CVE-2018-10662) M2 https://rules.emergingthreatspro.com/open/
ET TROJAN Fake Microsoft Teams CnC Payload Request (GET) https://rules.emergingthreatspro.com/open/
ET TROJAN Fake Microsoft Teams VBS Payload Inbound https://rules.emergingthreatspro.com/open/
ET TROJAN Lazarus APT Electron CnC Activity (GET) M1 https://rules.emergingthreatspro.com/open/
ET TROJAN Lazarus APT Electron CnC Activity (GET) M2 https://rules.emergingthreatspro.com/open/
ET TROJAN Lazarus APT Electron CnC Activity (GET) M3 https://rules.emergingthreatspro.com/open/

2025-01_ASEC_Notes_5.yar

2025-01_ASEC_Notes_5_snort.rules