주간 탐지 룰(YARA, Snort) 정보 – 2024년 6월 4주차

주간 탐지 룰(YARA, Snort) 정보 – 2024년 6월 4주차

AhnLab TIP 서비스에서 수집한, 공개된 YARA, Snort룰(2024년 6월 4주) 정보입니다.

  • YARA룰 8건
탐지명 설명 출처
malware_cobaltstrike_workersdevloader CobaltStrike 로더 탐지 https://github.com/JPCERTCC/jpcert-yara
Kimsuky_downloader_vbs Kimsuky VBS 파일 다운로더 Powershell 탐지 https://github.com/JPCERTCC/jpcert-yara
Kimsuky_PokDoc_ps1 Kimsuky 장치 정보 수집 Powershell 탐지 https://github.com/JPCERTCC/jpcert-yara
Kimsuky_InfoKey_ps1 Kimsuky 키로거 Powershell 탐지 https://github.com/JPCERTCC/jpcert-yara
malware_DOPLUGS DOPLUGS 탐지 https://github.com/JPCERTCC/jpcert-yara
malware_DOPLUGSLoader DOPLUGS 로더 탐지 https://github.com/JPCERTCC/jpcert-yara
malware_webrcs_lnk WEBRCS 실행 LNK 파일 탐지 https://github.com/JPCERTCC/jpcert-yara
malware_webrcs WEBRCS 탐지 https://github.com/JPCERTCC/jpcert-yara
  • Snort룰 14건
탐지명 설명 출처
ET EXPLOIT HikVision Arbitrary Directory Traversal Attempt HikVision 임의파일 읽기 취약점 시도 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Win32/ProcessKiller CnC Initialization M2 ProcessKiller C2 연결 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN ClickFix CnC Activity (POST) CLickFix C2 연결 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN ClickFix Obfuscated Payload Inbound ClickFix 난독화 페이로드 유입 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Fickle Stealer C2 Server Tasking Fickle Stealer C2 연결 해킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Suspected Powershell Empire Activity M1 Powershell Empire 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Suspected Powershell Empire Activity M2 Powershell Empire 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Suspected Powershell Empire Activity M3 Powershell Empire 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN [ANY.RUN] NjRat (tXRAT v.2.3R) Client Sends State Active Window NjRat 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN [ANY.RUN] NjRat (tXRAT v.2.3R) Server Sends Plugin to Client NjRat 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN [ANY.RUN] NjRat (tXRAT v.2.3R) Client Sends Check-in Packet NjRat 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET MOBILE_MALWARE Android Rafel RAT Checkin M2 Rafael RAT C2연결 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET MOBILE_MALWARE Android Rafel RAT Checkin M1 Rafael RAT C2연결 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET EXPLOIT Solarwinds Serv-U Directory Traversal Attempt Inbound (CVE-2024-28995) Solawinds CVE-2024-28995 익스플로잇 시도 패킷 탐지 https://rules.emergingthreatspro.com/open/

상세 룰 파일은 첨부파일로 제공됩니다.

2024-06_ASEC_Notes_4_snort.rules

2024-06_ASEC_Notes_4.yar