Talos Rules 2021-04-20
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)
 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)

Modified Rules:


 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)
 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)

Modified Rules:


 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)
 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)

Modified Rules:


 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)
 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)

Modified Rules:


 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)
 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)

Modified Rules:


 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)
 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091500.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)
 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)

Modified Rules:


 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)
 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)

Modified Rules:


 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)
 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)

Modified Rules:


 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)
 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)

Modified Rules:


 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)
 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (snort3-server-webapp.rules)
 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (snort3-policy-other.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (snort3-server-webapp.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (snort3-server-webapp.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (snort3-server-webapp.rules)
 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (snort3-malware-cnc.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (snort3-server-webapp.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (snort3-server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (snort3-server-webapp.rules)

Modified Rules:


 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (snort3-malware-cnc.rules)
 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (snort3-malware-cnc.rules)

2021-04-20 12:38:37 UTC

Snort Subscriber Rules Update

Date: 2021-04-20

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57433 <-> DISABLED <-> POLICY-OTHER VMware vRealize Operations Manager potential maintenceAdmin credentials leak attempt (policy-other.rules)
 * 1:57435 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt (server-webapp.rules)
 * 1:57432 <-> DISABLED <-> SERVER-WEBAPP Webmin shell index.cgi module cross site scripting attempt (server-webapp.rules)
 * 1:57434 <-> DISABLED <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt (server-webapp.rules)
 * 1:57437 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57439 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)
 * 1:57436 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt (server-webapp.rules)
 * 1:57431 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Remcos variant outbound connection (malware-cnc.rules)
 * 1:57438 <-> DISABLED <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt (server-webapp.rules)

Modified Rules:


 * 1:29440 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Chewbacca outbound connection (malware-cnc.rules)
 * 1:33681 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Carbanak connection to server (malware-cnc.rules)