Weekly Detection Rule (YARA and Snort) Information – Week 2, February 2025

Weekly Detection Rule (YARA and Snort) Information – Week 2, February 2025

The following is the information on Yara and Snort rules (week 2, February 2025) collected and shared by the AhnLab TIP service.

  • 2 YARA Rules

Detection name

Description

Source

PK_Binance_nuxt Phishing Kit impersonating Binance https://github.com/t4d/PhishingKit-Yara-Rules
PK_MondialRelay_traffyque Phishing Kit impersonating Mondial Relay https://github.com/t4d/PhishingKit-Yara-Rules
  • 20 Snort Rules

Detection name

Source

ET POLICY Contec Health CMS8000 Patient Monitor Insecure Default HL7 Protocol Server IP (CVE-2025-0626) https://rules.emergingthreatspro.com/open/
ET POLICY Contec Health CMS8000 Patient Monitor Insecure Default CMS Protocol Server IP (CVE-2025-0626) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS YETI Platform Server-Side Template Injection (CVE-2024-45607) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS SimpleHelp Support Server Unauthenticated Path Traversal (serverconfig.xml) (CVE-2024-57727) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Ivanti Endpoint Manager Unauthorized XML External Entity (CVE-2024-37397) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS QNAP Viostor server.cgi SPECIFIC_SERVER Parameter Command Injection Attempt (CVE-2023-47565) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS HPE Insights Remote Support XML External Entity Injection (CVE-2024-53675) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Ivanti Avalanche SmartDeviceServer XML External Entity Injection (CVE-2024-38653) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS FXC AE1021 Series Router ntp.general.hostname Authenticated Command Injection Attempt (CVE-2023-49897) https://rules.emergingthreatspro.com/open/
ET CURRENT_EVENTS Tycoon2FA Phishing Kit Style Evasion https://rules.emergingthreatspro.com/open/
ET POLICY Plaintext SSH Private Key Outbound over HTTP https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS DrayTek Gateway Web Management Interface OS Command Injection (CVE-2024-12987) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Ivanti EPM Cloud Services Appliance Backdoor Access Attempt (CVE-2021-44529) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Ivanti EPM Cloud Services Appliance Backdoor Response (CVE-2021-44529) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS D-Link DIR-605 getcfg.php Authentication Bypass Attempt (CVE-2021-40655) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Possible Roundcube XSS via Malicious XML Attachment (CVE-2020-13965) https://rules.emergingthreatspro.com/open/
ET TROJAN Onestart AI Host Profile Checkin (POST) https://rules.emergingthreatspro.com/open/
ET TROJAN Onestart AI Program Version Checkin (POST) https://rules.emergingthreatspro.com/open/
ET TROJAN Winos4.0 Framework CnC Checkin (x32.) https://rules.emergingthreatspro.com/open/
ET TROJAN Winos4.0 Framework CnC Login Message CnC Server Response https://rules.emergingthreatspro.com/open/

2025-02_ASEC_Notes_2.yar

2025-02_ASEC_Notes_2_snort.rules