주간 탐지 룰(YARA, Snort) 정보 – 2025년 3월 2주차

주간 탐지 룰(YARA, Snort) 정보 – 2025년 3월 2주차

AhnLab TIP 서비스에서 수집한, 공개된 YARA, Snort룰(2025년 3월 2주) 정보입니다.

  • 5 YARA Rules

탐지명

설명

출처

PK_Generic_RD127 일반적인 메일 자격 증명 스틸러 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
PK_LIDL_ninja LIDL(독일 식료품점) 을 사칭하는 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
PK_MTBank_yochi2 M&T Bank를 사칭하는 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
PK_SpareBank_perso SpareBank를 사칭하는 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
PK_TrustWallet_next TrustWallet을 사칭하는 Phishing Kit 탐지 https://github.com/t4d/PhishingKit-Yara-Rules
  • 23 Snort Rules

탐지명

설명

출처

ET WEB_SPECIFIC_APPS Naviko Unauthenticated Arbitrary File Read (CVE-2024-48248) Naviko 비인가 임의 파일 읽기 (CVE-2024-48248) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Jenkins Chained Exploits CVE-2018-1000861 and CVE-2019-1003000 M3 Jenkins Chained Exploits CVE-2018-1000861, CVE-2019-1003000) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Screenshot Exfiltration via Discord Webhook (POST) Discord Webhooh 을 통한 Screenshot 유출 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN BeaverTail CnC Activity (POST) M1 BeaverTail CnC 활동 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN BeaverTail CnC Activity (POST) M2 BeaverTail CnC 활동 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN InvisibleFerret CnC Activity (GET) M4 InvisibleFerret CnC 활동 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Win32/SocGholish GhostWeaver Backdoor Activity (PowerShell BOINC Download Request) Win32/SocGholish GhostWeaver 백도어 활동 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN InvisibleFerret CnC Activity (GET) M5 InvisibleFerret CnC 활동 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN InvisibleFerret CnC Activity (GET) M6 InvisibleFerret CnC 활동 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Hitachi Vantara Pentaho Business Analytics Server Authorization Bypass and Remote Code Execution Attempt (CVE-2022-43769, 2022-43939) Hitachi Vantara Pentaho Business Analytics Server 인증 우회 및 원격 코드 실행 시도 (CVE-2022-43769, CVE-2022-43939) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN InvisibleFerret CnC Activity (POST) M1 InvisibleFerret CnC 활동 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN OtterCookie Host Profile Exfil OtterCookie Host Profile 유출 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN OtterCookie CnC Command Inbound (whour) OtterCookie CnC 커맨드 유입 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN OtterCookie File Exfiltration OtterCookie 파일 유출 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN OtterCookie Victim Command Execution Confirmation To CnC Server OtterCookie 피해자 커맨드 실행 확인 CnC 서버 전송 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN OtterCookie Payload Request OtterCookie 페이로드 요청 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN AsyncRAT Installer Payload Request AsyncRAT Installer 페이로드 요청 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN AsyncRAT Victim Checkin AsyncRAT 피해자 체크인 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET WEB_SPECIFIC_APPS Cisco ASA/FTD Memory Leak Attempt (CVE-2020-3259) Cisco ASA/FTD Memory Leak 시도 (CVE-2020-3259) 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET ATTACK_RESPONSE ClickFix MSHTA Command Inbound ClickFix MSHTA 커맨드 유입 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Observed POST to ClickFix Style URI M1 ClickFix 스타일 URI POST 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET ATTACK_RESPONSE ClickFix CnC Response (Click Logged Successfully) ClickFix CnC 응답 패킷 탐지 https://rules.emergingthreatspro.com/open/
ET TROJAN Observed GET to ClickFix Style URI M1 ClickFix 스타일 URI GET 패킷 탐지 https://rules.emergingthreatspro.com/open/

2025-03_ASEC_Notes_2.yar

2025-03_ASEC_Notes_2_snort.rules