Weekly Detection Rule (YARA and Snort) Information – Week 2, March 2025

Weekly Detection Rule (YARA and Snort) Information – Week 2, March 2025

The following is the information on Yara and Snort rules (week 2, March 2025) collected and shared by the AhnLab TIP service.

  • 5 YARA Rules

Detection name

Description

Source

PK_Generic_RD127 Phishing Kit – RD127 – Generic email credentials stealer https://github.com/t4d/PhishingKit-Yara-Rules
PK_LIDL_ninja Phishing Kit impersonating LIDL https://github.com/t4d/PhishingKit-Yara-Rules
PK_MTBank_yochi2 Phishing Kit impersonating M&T Bank https://github.com/t4d/PhishingKit-Yara-Rules
PK_SpareBank_perso Phishing Kit impersonating SpareBank1 https://github.com/t4d/PhishingKit-Yara-Rules
PK_TrustWallet_next Phishing Kit impersonating Trust Wallet https://github.com/t4d/PhishingKit-Yara-Rules
  • 23 Snort Rules

Detection name

Source

ET WEB_SPECIFIC_APPS Naviko Unauthenticated Arbitrary File Read (CVE-2024-48248) https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Jenkins Chained Exploits CVE-2018-1000861 and CVE-2019-1003000 M3 https://rules.emergingthreatspro.com/open/
ET TROJAN Screenshot Exfiltration via Discord Webhook (POST) https://rules.emergingthreatspro.com/open/
ET TROJAN BeaverTail CnC Activity (POST) M1 https://rules.emergingthreatspro.com/open/
ET TROJAN BeaverTail CnC Activity (POST) M2 https://rules.emergingthreatspro.com/open/
ET TROJAN InvisibleFerret CnC Activity (GET) M4 https://rules.emergingthreatspro.com/open/
ET TROJAN Win32/SocGholish GhostWeaver Backdoor Activity (PowerShell BOINC Download Request) https://rules.emergingthreatspro.com/open/
ET TROJAN InvisibleFerret CnC Activity (GET) M5 https://rules.emergingthreatspro.com/open/
ET TROJAN InvisibleFerret CnC Activity (GET) M6 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Hitachi Vantara Pentaho Business Analytics Server Authorization Bypass and Remote Code Execution Attempt (CVE-2022-43769, 2022-43939) https://rules.emergingthreatspro.com/open/
ET TROJAN InvisibleFerret CnC Activity (POST) M1 https://rules.emergingthreatspro.com/open/
ET TROJAN OtterCookie Host Profile Exfil https://rules.emergingthreatspro.com/open/

ET TROJAN OtterCookie CnC Command Inbound (whour)

https://rules.emergingthreatspro.com/open/

ET TROJAN OtterCookie File Exfiltration

https://rules.emergingthreatspro.com/open/

ET TROJAN OtterCookie Victim Command Execution Confirmation To CnC Server

https://rules.emergingthreatspro.com/open/

ET TROJAN OtterCookie Payload Request

https://rules.emergingthreatspro.com/open/

ET TROJAN AsyncRAT Installer Payload Request

https://rules.emergingthreatspro.com/open/

ET TROJAN AsyncRAT Victim Checkin

https://rules.emergingthreatspro.com/open/

ET WEB_SPECIFIC_APPS Cisco ASA/FTD Memory Leak Attempt (CVE-2020-3259)

https://rules.emergingthreatspro.com/open/

ET ATTACK_RESPONSE ClickFix MSHTA Command Inbound

https://rules.emergingthreatspro.com/open/

ET TROJAN Observed POST to ClickFix Style URI M1

https://rules.emergingthreatspro.com/open/

ET ATTACK_RESPONSE ClickFix CnC Response (Click Logged Successfully)

https://rules.emergingthreatspro.com/open/

ET TROJAN Observed GET to ClickFix Style URI M1

https://rules.emergingthreatspro.com/open/

2025-03_ASEC_Notes_2.yar

2025-03_ASEC_Notes_2_snort.rules