Talos has added and modified multiple rules in the file-pdf, malware-cnc, os-other, server-apache and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules)
* 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules)
* 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules)
* 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules)
* 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules)
* 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules) * 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091500.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules)
* 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules)
* 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules)
* 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules)
* 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (snort3-server-other.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (snort3-server-other.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (snort3-server-webapp.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (snort3-file-pdf.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (snort3-file-pdf.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (snort3-server-webapp.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (snort3-server-webapp.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (snort3-malware-cnc.rules) * 1:300015 <-> ENABLED <-> SERVER-OTHER Cisco IOS HTTP percent sign denial of service attempt (snort3-native.rules)
* 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (snort3-server-webapp.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (snort3-server-webapp.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (snort3-server-other.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (snort3-server-other.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (snort3-server-other.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (snort3-server-other.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (snort3-server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (snort3-server-webapp.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (snort3-os-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (snort3-server-webapp.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (snort3-server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (snort3-server-apache.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:57568 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57559 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57569 <-> DISABLED <-> SERVER-OTHER Oracle Java PhantomReference object handling memory corruption attempt (server-other.rules) * 1:57561 <-> ENABLED <-> MALWARE-CNC Win.Spyware.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57565 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57560 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57564 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57553 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57562 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57551 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57552 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57557 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57563 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:57555 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57566 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57556 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57567 <-> DISABLED <-> FILE-PDF Adobe Acrobat Reader DC Annots.api setProps use-after-free attempt (file-pdf.rules) * 1:57554 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules) * 1:57558 <-> ENABLED <-> MALWARE-CNC Win.Trojan.CrimsonRat outbound connection attempt (malware-cnc.rules)
* 1:30031 <-> DISABLED <-> SERVER-WEBAPP IBM Lotus Domino stack buffer overflow attempt (server-webapp.rules) * 1:32261 <-> DISABLED <-> SERVER-WEBAPP PineApp Mail-SeCure conflivelog.pl install license command injection attempt (server-webapp.rules) * 1:36461 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost sadminpwd buffer overflow attempt (server-other.rules) * 1:36462 <-> DISABLED <-> SERVER-OTHER Novell eDirectory DHost verifypwd buffer overflow attempt (server-other.rules) * 1:41810 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file upload attempt (server-other.rules) * 1:41811 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file delete attempt (server-other.rules) * 1:41812 <-> DISABLED <-> SERVER-OTHER Apache ActiveMQ fileserver broker service file move attempt (server-other.rules) * 1:43238 <-> DISABLED <-> SERVER-WEBAPP Imatix Xitami web server head processing denial of service attempt (server-webapp.rules) * 1:43388 <-> DISABLED <-> OS-OTHER Apple OSX CFNetwork HTTP response denial of service attempt (os-other.rules) * 1:44001 <-> DISABLED <-> SERVER-WEBAPP PHP malformed quoted printable denial of service attempt (server-webapp.rules) * 1:44483 <-> DISABLED <-> SERVER-OTHER Supervisord remote code execution attempt (server-other.rules) * 1:51547 <-> DISABLED <-> SERVER-APACHE Apache cookie logging denial of service attempt (server-apache.rules)