Talos Rules 2020-06-30
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-ie, file-image, file-other, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2020-06-30 12:05:56 UTC

Snort Subscriber Rules Update

Date: 2020-06-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:54409 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54408 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54407 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54406 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54405 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54404 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54403 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54402 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54401 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54400 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54399 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54398 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54395 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54418 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54417 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54410 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 3:54411 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54412 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54413 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54414 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54415 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54416 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)

Modified Rules:


 * 1:53885 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6200 series SQL injection attempt (server-webapp.rules)
 * 1:53859 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53857 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53858 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)

2020-06-30 12:05:56 UTC

Snort Subscriber Rules Update

Date: 2020-06-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:54410 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54400 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54398 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54401 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54395 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54405 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54406 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54407 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54408 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54418 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54417 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54409 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54404 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54402 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54399 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54403 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 3:54413 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54411 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54414 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54416 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54415 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54412 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)

Modified Rules:


 * 1:53885 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6200 series SQL injection attempt (server-webapp.rules)
 * 1:53857 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53859 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53858 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)

2020-06-30 12:05:56 UTC

Snort Subscriber Rules Update

Date: 2020-06-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091500.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:54402 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54399 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54417 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54395 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54418 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54410 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54401 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54407 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54406 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54409 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54398 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54408 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54405 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54403 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54404 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54400 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 3:54411 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54416 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54412 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54413 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54415 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54414 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)

Modified Rules:


 * 1:53859 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53858 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53857 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53885 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6200 series SQL injection attempt (server-webapp.rules)

2020-06-30 12:05:56 UTC

Snort Subscriber Rules Update

Date: 2020-06-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:54398 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54405 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54418 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54399 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54400 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54417 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54403 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54408 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54409 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54407 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54401 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54395 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54402 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54404 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54410 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54406 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 3:54416 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54411 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54412 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54415 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54413 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54414 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)

Modified Rules:


 * 1:53885 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6200 series SQL injection attempt (server-webapp.rules)
 * 1:53858 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53857 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53859 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)

2020-06-30 12:05:56 UTC

Snort Subscriber Rules Update

Date: 2020-06-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:54405 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54398 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54400 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54395 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54404 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54417 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54402 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54410 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54408 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54406 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54409 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54407 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54401 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54418 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54399 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54403 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 3:54413 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54411 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54416 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54414 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54415 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54412 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)

Modified Rules:


 * 1:53857 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53858 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53885 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6200 series SQL injection attempt (server-webapp.rules)
 * 1:53859 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)

2020-06-30 12:05:56 UTC

Snort Subscriber Rules Update

Date: 2020-06-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:54398 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54418 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54404 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54405 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54417 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54395 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54401 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54402 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54399 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54410 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54406 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54408 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54409 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54407 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54400 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54403 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 3:54416 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54411 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54414 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54415 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54412 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54413 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)

Modified Rules:


 * 1:53857 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53885 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6200 series SQL injection attempt (server-webapp.rules)
 * 1:53858 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53859 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)

2020-06-30 12:05:56 UTC

Snort Subscriber Rules Update

Date: 2020-06-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:54401 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (snort3-malware-cnc.rules)
 * 1:54406 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (snort3-server-webapp.rules)
 * 1:54397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (snort3-malware-other.rules)
 * 1:54399 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (snort3-browser-ie.rules)
 * 1:54403 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (snort3-malware-cnc.rules)
 * 1:54402 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (snort3-malware-cnc.rules)
 * 1:54396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (snort3-malware-other.rules)
 * 1:54418 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (snort3-malware-other.rules)
 * 1:54417 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (snort3-malware-other.rules)
 * 1:54404 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (snort3-malware-cnc.rules)
 * 1:54407 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (snort3-malware-other.rules)
 * 1:54409 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (snort3-malware-other.rules)
 * 1:54400 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (snort3-browser-ie.rules)
 * 1:54410 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (snort3-malware-other.rules)
 * 1:54408 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (snort3-malware-other.rules)
 * 1:54405 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (snort3-server-webapp.rules)
 * 1:54395 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (snort3-malware-other.rules)
 * 1:54398 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (snort3-malware-other.rules)

Modified Rules:


 * 1:53885 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6200 series SQL injection attempt (snort3-server-webapp.rules)
 * 1:53859 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (snort3-server-webapp.rules)
 * 1:53857 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (snort3-server-webapp.rules)
 * 1:53858 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (snort3-server-webapp.rules)

2020-06-30 12:05:56 UTC

Snort Subscriber Rules Update

Date: 2020-06-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:54399 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54400 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer JavaScript engine memory corruption attempt (browser-ie.rules)
 * 1:54397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54408 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54403 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54404 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54409 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54417 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 1:54398 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Barys-8338518-0 download attempt (malware-other.rules)
 * 1:54406 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54407 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Zeus-8336989-0 download attempt (malware-other.rules)
 * 1:54402 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54405 <-> DISABLED <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt (server-webapp.rules)
 * 1:54401 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Valak malicious outbound connection attempt (malware-cnc.rules)
 * 1:54410 <-> DISABLED <-> MALWARE-OTHER Win.Dropper.Waledac-8338517-0 download attempt (malware-other.rules)
 * 1:54395 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Shiz-8295940-0 download attempt (malware-other.rules)
 * 1:54418 <-> DISABLED <-> MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt (malware-other.rules)
 * 3:54413 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54415 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54414 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54416 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2020-1101 attack attempt (file-other.rules)
 * 3:54411 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)
 * 3:54412 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2020-1095 attack attempt (file-image.rules)

Modified Rules:


 * 1:53859 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53885 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6200 series SQL injection attempt (server-webapp.rules)
 * 1:53858 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)
 * 1:53857 <-> ENABLED <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt (server-webapp.rules)