주간 탐지 룰(YARA, Snort) 정보 – 2025년 2월 1주차

주간 탐지 룰(YARA, Snort) 정보 – 2025년 2월 1주차

AhnLab TIP 서비스에서 수집한, 공개된 YARA, Snort룰(2025년 2월 1주) 정보입니다.

  • 14 YARA Rules

탐지명

설명

출처

PK_Ameli_sunrise22 Ameli.fr (프랑스 건강보험)을 사칭한 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
PK_Aramex_panel Aramex (국제 물류 배송)를 사칭한 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
PK_Doctolib_js Doctolib (프랑스 온라인 의료 예약 플랫폼)를 사칭한 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
PK_Email_CN 126.com, 163.com (중국 메일 서비스)을 사칭한 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
PK_OneDrive_hrm OneDrive 를 사칭한 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
sig_27138_Veeam_Get_Creds 악성코드 Veeam-Get-Creds.ps1 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
sig_27138_lockbit_sd 악성코드 sd.exe 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
sig_27138_setup_wm 악성코드 setup_wm.exe 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
sig_27138_share_svcmc 악성코드 svcmc.dll 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
sig_27138_systembc_svc 악성코드 svc.dll 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
sig_27138_svchosts_ghostsocks 악성코드 svchosts.exe 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
sig_27138_share__SETUP 악성코드 SETUP.bat 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
sig_27138_files_check 악성코드 check.exe 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
sig_27138_svcmc_svchosts_0 악성코드 svcmc.dll, svchosts.exe 파일 탐지 https://github.com/The-DFIR-Report/Yara-Rules
  • 30 Snort Rules

탐지명

설명

출처

ET TROJAN Nosviak C2 Variant Advertised Services in HTML Elements Nosviak C2 변종 광고 서비스 HTML Elements 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Cindy C2 SSH Server Banner Cindy C2 SSH 서버 배너 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Moonly C2 SSH Server Banner Moonly C2 SSH 서버 배너 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Nosviak C2 SSH Server Banner Nosviak C2 SSH 서버 배너 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN RCNC C2 SSH Server Banner RCNC C2 SSH 서버 배너 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Sentinel C2 SSH Server Banner Sentinel C2 SSH 서버 배너 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Microsoft Configuration Manager Unauthenticated SQL Injection (CVE-2024-43468) Microsoft Configuration Manager 비인가 SQL 인젝션(CVE-2024-43468) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS TP-Link TL-WR940N Hardware v3/v4 Authenticated Remote Code Execution (CVE-2024-54887) TP-Link TL-WR940N 하드웨어 v3/v4 인증된 원격 코드 실행(CVE-2024-54887) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Reolink RLC Series IP Camera TestEmail Authenticated Command Injection Attempt (CVE-2019-11001) Reolink RLC Series IP Camera TestEmail 인증된 커맨드 인젝션 시도(CVE-2019-11001) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition during JSP Compilation (CVE-2024-50379) Apache Tomcat Time-of-check Time-of-use (TOCTOU) 레이스 컨디션 (CVE-2024-50379) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Next.js Forced Caching via x-now-route-matches HTTP Header (CVE-2024-46982) Next.js x-now-route-matches HTTP 헤더를 통한 강제 캐싱(CVE-2024-46982) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Next.js Cached Server Response (CVE-2024-46982) Next.js 캐시된 서버 응답(CVE-2024-46982) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Reolink RLC Series IP Camera SetLocalLink Authenticated Command Injection Attempt (CVE-2021-40410, CVE-2021-40411) Reolink RLC Series IP Camera SetLocalLink 인증된 커맨드 인젝션 시도(CVE-2021-40410, CVE-2021-40411) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Reolink RLC Series IP Camera SetDevName Authenticated Command Injection Attempt (CVE-2021-40412) Reolink RLC Series IP Camera SetDevName 인증된 커맨드 인젝션 시도(CVE-2021-40412) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS CyberPanel getresetstatus statusfile Parameter Command Injection Attempt (CVE-2024-51378) CyberPanel getresetstatus statusfile 파라미터 커맨드 인젝션 시도(CVE-2024-51378) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS ProjectSend Authentication Bypass Attempt M1 – Title Defacement Attempt (CVE-2024-11680) ProjectSend 인증 우회 시도 (CVE-2024-11680) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS QNAP QTS/QuTS File Upload (CVE-2024-53691) QNAP QTS/QuTS 파일 업로드(CVE-2024-53691) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS QNAP QTS/QuTS Unpack File (CVE-2024-53691) QNAP QTS/QuTS 파일 압축 해제(CVE-2024-53691) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS ProjectSend Authentication Bypass Attempt M2 – Account Creation Attempt (CVE-2024-11680) ProjectSend 인증 우회 시도(CVE-2024-11680) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET ATTACK_RESPONSE Koi Loader/Stealer CnC Config Inbound Koi Loader/Stealer C2 Config 유입 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS ProjectSend Authentication Bypass Attempt M3 – PHP File Upload Attempt (CVE-2024-11680) ProjectSend 인증 우회 시도(CVE-2024-11680) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS QNAP QTS/QuTS Decrypt File (CVE-2024-53691) QNAP QTS/QuTS 파일 복호화(CVE-2024-53691) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Apache Solr ConfigSet APIv1 Upload Relative Path Traversal (CVE-2024-52012) Apache Solr ConfigSet APIv1 업로드 상대 경로 탐색(CVE-2024-52012) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Apache Solr ConfigSet APIv2 Upload Relative Path Traversal (CVE-2024-52012) Apache Solr ConfigSet APIv2 업로드 상대 경로 탐색(CVE-2024-52012) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Win32/Koi Stealer CnC Checkin (GET) Koi Stealer C2 연결 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET ATTACK_RESPONSE Koi Loader/Stealer Payload Inbound Koi Loader/Stealer 페이로드 유입 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Mitel 6800 802.1x Support Command Injection (CVE-2024-41710) Mitel 6800 802.1x Support 커맨드 인젝션(CVE-2024-41710) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS SonicOS SSLVPN Authentication Bypass (CVE-2024-53704) SonicOS SSLVPN 인증 우회(CVE-2024-53704) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Qlik Sense Enterprise HTTP Request Tunneling Attempt (CVE-2023-48365) Qlik Sense Enterprise HTTP 요청 터널링 시도 (CVE-2023-48365) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN CoinMiner Exfiltration via IRC Config Inbound (Italian) CoinMiner IRC Config 유입을 통한 데이터 유출 패킷 탐지 https://rules.emergingthreatspro.com/open/

2025-02_ASEC_Notes_1.yar

2025-02_ASEC_Notes_1_snort.rules