Talos Rules 2021-06-01
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the deleted, indicator-compromise, malware-other, protocol-voip and server-webapp rule sets to provide coverage for emerging threats from these technologies.

Change logs

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091500.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (snort3-malware-other.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (snort3-protocol-voip.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (snort3-protocol-voip.rules)
 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (snort3-malware-other.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (snort3-protocol-voip.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (snort3-malware-other.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (snort3-malware-other.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (snort3-malware-other.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (snort3-malware-other.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (snort3-server-webapp.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (snort3-deleted.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (snort3-malware-other.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (snort3-malware-other.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (snort3-server-webapp.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (snort3-protocol-voip.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (snort3-server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (snort3-indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (snort3-server-apache.rules)

2021-06-01 18:21:51 UTC

Snort Subscriber Rules Update

Date: 2021-06-01

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57681 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt (malware-other.rules)
 * 1:13308 <-> DISABLED <-> DELETED 7fOlAaYNTJ5MYtNC9d70QQDrywsAL1Gr (deleted.rules)
 * 1:57684 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57680 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57686 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57683 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)
 * 1:57682 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57674 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57678 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57676 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57677 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt (malware-other.rules)
 * 1:57673 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:57675 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt (malware-other.rules)
 * 1:57679 <-> DISABLED <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt (malware-other.rules)
 * 1:57685 <-> DISABLED <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt (protocol-voip.rules)

Modified Rules:


 * 1:15477 <-> DISABLED <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt (server-webapp.rules)
 * 1:26850 <-> DISABLED <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt (indicator-compromise.rules)
 * 1:57580 <-> DISABLED <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt (server-apache.rules)

2021-06-01 18:26:38 UTC

Snort Subscriber Rules Update

Date: 2021-06-01-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:57673 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57674 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57675 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57676 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57677 <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt
* 1:57678 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57679 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57680 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57681 <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt
* 1:57682 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57683 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57684 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57685 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57686 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt

Modified Rules:

* 1:15477 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:26850 <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt
* 1:57580 <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt


2021-06-01 18:26:38 UTC

Snort Subscriber Rules Update

Date: 2021-06-01-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:57673 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57674 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57675 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57676 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57677 <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt
* 1:57678 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57679 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57680 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57681 <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt
* 1:57682 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57683 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57684 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57685 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57686 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt

Modified Rules:

* 1:15477 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:26850 <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt
* 1:57580 <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt


2021-06-01 18:26:38 UTC

Snort Subscriber Rules Update

Date: 2021-06-01-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:57673 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57674 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57675 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57676 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57677 <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt
* 1:57678 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57679 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57680 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57681 <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt
* 1:57682 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57683 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57684 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57685 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57686 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt

Modified Rules:

* 1:15477 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:26850 <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt
* 1:57580 <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt


2021-06-01 18:26:38 UTC

Snort Subscriber Rules Update

Date: 2021-06-01-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:57673 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57674 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57675 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57676 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57677 <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt
* 1:57678 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57679 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57680 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57681 <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt
* 1:57682 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57683 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57684 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57685 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57686 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt

Modified Rules:

* 1:15477 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:26850 <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt
* 1:57580 <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt


2021-06-01 18:26:38 UTC

Snort Subscriber Rules Update

Date: 2021-06-01-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:57673 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57674 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57675 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57676 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57677 <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt
* 1:57678 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57679 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57680 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57681 <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt
* 1:57682 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57683 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57684 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57685 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57686 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt

Modified Rules:

* 1:15477 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:26850 <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt
* 1:57580 <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt


2021-06-01 18:26:38 UTC

Snort Subscriber Rules Update

Date: 2021-06-01-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:57673 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57674 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57675 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57676 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57677 <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt
* 1:57678 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57679 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57680 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57681 <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt
* 1:57682 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57683 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57684 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57685 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57686 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt

Modified Rules:

* 1:15477 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:26850 <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt
* 1:57580 <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt


2021-06-01 18:26:38 UTC

Snort Subscriber Rules Update

Date: 2021-06-01-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:57673 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57674 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57675 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57676 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57677 <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt
* 1:57678 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57679 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57680 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57681 <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt
* 1:57682 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57683 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57684 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57685 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57686 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt

Modified Rules:

* 1:15477 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:26850 <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt
* 1:57580 <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt


2021-06-01 18:26:38 UTC

Snort Subscriber Rules Update

Date: 2021-06-01-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:57673 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57674 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:57675 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57676 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57677 <-> MALWARE-OTHER Sliver HTTP implant outbound session initialization attempt
* 1:57678 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57679 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57680 <-> MALWARE-OTHER Sliver HTTP implant outbound message attempt
* 1:57681 <-> MALWARE-OTHER Sliver HTTP implant outbound poll attempt
* 1:57682 <-> MALWARE-OTHER Sliver HTTP implant outbound public key request attempt
* 1:57683 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57684 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57685 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt
* 1:57686 <-> PROTOCOL-VOIP SIP Torture Retry-After field with overly-large value attempt

Modified Rules:

* 1:15477 <-> SERVER-WEBAPP Oracle BEA WebLogic overlong JESSIONID buffer overflow attempt
* 1:26850 <-> INDICATOR-COMPROMISE Microsoft Internet Explorer IE5 compatibility mode enable attempt
* 1:57580 <-> SERVER-APACHE Apache HTTP Server auth_ldap format string exploit attempt