Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with an already known threat actor. https://blog.talosintelligence.com/2020/04/poetrat-covid-19-lures.html. Snort rules 53689-53691 will cover this.
Talos also has added and modified multiple rules in the browser-other, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:53694 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53693 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53692 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53691 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53690 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53689 <-> ENABLED <-> MALWARE-CNC Win.Malware.PoetRat malware variant FTP login (malware-cnc.rules) * 1:53688 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53687 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 3:53686 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2020-1055 attack attempt (browser-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:53694 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53688 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53687 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53692 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53689 <-> ENABLED <-> MALWARE-CNC Win.Malware.PoetRat malware variant FTP login (malware-cnc.rules) * 1:53693 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53691 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53690 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 3:53686 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2020-1055 attack attempt (browser-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091500.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:53687 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53688 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53694 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53690 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53692 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53691 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53689 <-> ENABLED <-> MALWARE-CNC Win.Malware.PoetRat malware variant FTP login (malware-cnc.rules) * 1:53693 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 3:53686 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2020-1055 attack attempt (browser-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:53693 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53688 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53687 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53692 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53694 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53691 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53689 <-> ENABLED <-> MALWARE-CNC Win.Malware.PoetRat malware variant FTP login (malware-cnc.rules) * 1:53690 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 3:53686 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2020-1055 attack attempt (browser-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:53688 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53690 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53691 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53689 <-> ENABLED <-> MALWARE-CNC Win.Malware.PoetRat malware variant FTP login (malware-cnc.rules) * 1:53692 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53693 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53694 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53687 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 3:53686 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2020-1055 attack attempt (browser-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:53693 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53688 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53694 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53690 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53692 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53687 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53689 <-> ENABLED <-> MALWARE-CNC Win.Malware.PoetRat malware variant FTP login (malware-cnc.rules) * 1:53691 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 3:53686 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2020-1055 attack attempt (browser-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:53688 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (snort3-server-webapp.rules) * 1:53687 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (snort3-server-webapp.rules) * 1:53689 <-> ENABLED <-> MALWARE-CNC Win.Malware.PoetRat malware variant FTP login (snort3-malware-cnc.rules) * 1:53690 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (snort3-malware-other.rules) * 1:53693 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (snort3-malware-cnc.rules) * 1:53691 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (snort3-malware-other.rules) * 1:53692 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (snort3-malware-cnc.rules) * 1:53694 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (snort3-malware-cnc.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:53688 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53693 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53689 <-> ENABLED <-> MALWARE-CNC Win.Malware.PoetRat malware variant FTP login (malware-cnc.rules) * 1:53690 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53687 <-> DISABLED <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt (server-webapp.rules) * 1:53694 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 1:53691 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.PoetRAT malicious document download attempt (malware-other.rules) * 1:53692 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Hiddentears variant outbound connection (malware-cnc.rules) * 3:53686 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2020-1055 attack attempt (browser-other.rules)