The Sourcefire VRT has added and modified multiple rules in the blacklist, exploit-kit, malware-cnc, pua-adware and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2956.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:31169 <-> ENABLED <-> BLACKLIST DNS request for known malware domain lvpconveyors.co.uk - Win.Trojan.Cryptodefence (blacklist.rules) * 1:31156 <-> ENABLED <-> BLACKLIST DNS request for known malware domain smart.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31153 <-> ENABLED <-> BLACKLIST DNS request for known malware domain group.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31168 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Guise outbound communication (malware-cnc.rules) * 1:31166 <-> DISABLED <-> PUA-ADWARE InstallRex bundled installer outbound activity (pua-adware.rules) * 1:31167 <-> DISABLED <-> PUA-ADWARE InstallRex bundled installer outbound activity (pua-adware.rules) * 1:31164 <-> ENABLED <-> BLACKLIST DNS request for known malware domain i1.megagetnews.net (blacklist.rules) * 1:31165 <-> ENABLED <-> BLACKLIST DNS request for known malware domain r1.getapplicationmy.info (blacklist.rules) * 1:31163 <-> ENABLED <-> BLACKLIST DNS request for known malware domain c1.downlloaddatamy.info (blacklist.rules) * 1:31161 <-> ENABLED <-> SERVER-OTHER AuraCMS LFI attempt (server-other.rules) * 1:31162 <-> ENABLED <-> SERVER-OTHER Beetel 450TC2 CSRF attempt (server-other.rules) * 1:31159 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31160 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31157 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31158 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31175 <-> ENABLED <-> BLACKLIST DNS request for known malware domain zelvesz.2u.se - Win.Trojan.Tempest (blacklist.rules) * 1:31174 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sapart variant outbound connection (malware-cnc.rules) * 1:31149 <-> DISABLED <-> SERVER-WEBAPP Supermicro Intelligent Management Controller login.cgi buffer overflow attempt (server-webapp.rules) * 1:31173 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules) * 1:31170 <-> ENABLED <-> BLACKLIST DNS request for known malware domain technopoleci.com - Win.Trojan.Cryptodefence (blacklist.rules) * 1:31148 <-> DISABLED <-> SERVER-WEBAPP Supermicro Intelligent Management Controller login.cgi buffer overflow attempt (server-webapp.rules) * 1:31150 <-> ENABLED <-> BLACKLIST User-Agent known malicious User-Agent DefaultBotPassword - Win.Trojan.Tirabot (blacklist.rules) * 1:31147 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zadnilay variant outbound connection (malware-cnc.rules) * 1:31172 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules) * 1:31151 <-> ENABLED <-> BLACKLIST DNS request for known malware domain code.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31152 <-> ENABLED <-> BLACKLIST DNS request for known malware domain fly.aggipulla.in - Win.Trojan.Fareit (blacklist.rules) * 1:31154 <-> ENABLED <-> BLACKLIST DNS request for known malware domain hotel.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31155 <-> ENABLED <-> BLACKLIST DNS request for known malware domain key.aggipulla.in - Win.Trojan.Fareit (blacklist.rules) * 1:31171 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules)
* 1:29443 <-> ENABLED <-> EXPLOIT-KIT Fiesta exploit kit outbound connection attempt (exploit-kit.rules) * 1:30934 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit encrypted binary download (exploit-kit.rules) * 1:30935 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit landing page - specific structure (exploit-kit.rules) * 1:30936 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure (exploit-kit.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2960.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:31154 <-> ENABLED <-> BLACKLIST DNS request for known malware domain hotel.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31152 <-> ENABLED <-> BLACKLIST DNS request for known malware domain fly.aggipulla.in - Win.Trojan.Fareit (blacklist.rules) * 1:31153 <-> ENABLED <-> BLACKLIST DNS request for known malware domain group.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31151 <-> ENABLED <-> BLACKLIST DNS request for known malware domain code.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31148 <-> DISABLED <-> SERVER-WEBAPP Supermicro Intelligent Management Controller login.cgi buffer overflow attempt (server-webapp.rules) * 1:31147 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zadnilay variant outbound connection (malware-cnc.rules) * 1:31150 <-> ENABLED <-> BLACKLIST User-Agent known malicious User-Agent DefaultBotPassword - Win.Trojan.Tirabot (blacklist.rules) * 1:31155 <-> ENABLED <-> BLACKLIST DNS request for known malware domain key.aggipulla.in - Win.Trojan.Fareit (blacklist.rules) * 1:31156 <-> ENABLED <-> BLACKLIST DNS request for known malware domain smart.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31157 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31158 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31159 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31160 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31161 <-> ENABLED <-> SERVER-OTHER AuraCMS LFI attempt (server-other.rules) * 1:31162 <-> ENABLED <-> SERVER-OTHER Beetel 450TC2 CSRF attempt (server-other.rules) * 1:31163 <-> ENABLED <-> BLACKLIST DNS request for known malware domain c1.downlloaddatamy.info (blacklist.rules) * 1:31164 <-> ENABLED <-> BLACKLIST DNS request for known malware domain i1.megagetnews.net (blacklist.rules) * 1:31165 <-> ENABLED <-> BLACKLIST DNS request for known malware domain r1.getapplicationmy.info (blacklist.rules) * 1:31166 <-> DISABLED <-> PUA-ADWARE InstallRex bundled installer outbound activity (pua-adware.rules) * 1:31167 <-> DISABLED <-> PUA-ADWARE InstallRex bundled installer outbound activity (pua-adware.rules) * 1:31168 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Guise outbound communication (malware-cnc.rules) * 1:31175 <-> ENABLED <-> BLACKLIST DNS request for known malware domain zelvesz.2u.se - Win.Trojan.Tempest (blacklist.rules) * 1:31149 <-> DISABLED <-> SERVER-WEBAPP Supermicro Intelligent Management Controller login.cgi buffer overflow attempt (server-webapp.rules) * 1:31174 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sapart variant outbound connection (malware-cnc.rules) * 1:31173 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules) * 1:31171 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules) * 1:31172 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules) * 1:31170 <-> ENABLED <-> BLACKLIST DNS request for known malware domain technopoleci.com - Win.Trojan.Cryptodefence (blacklist.rules) * 1:31169 <-> ENABLED <-> BLACKLIST DNS request for known malware domain lvpconveyors.co.uk - Win.Trojan.Cryptodefence (blacklist.rules)
* 1:29443 <-> ENABLED <-> EXPLOIT-KIT Fiesta exploit kit outbound connection attempt (exploit-kit.rules) * 1:30934 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit encrypted binary download (exploit-kit.rules) * 1:30935 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit landing page - specific structure (exploit-kit.rules) * 1:30936 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure (exploit-kit.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2961.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:31175 <-> ENABLED <-> BLACKLIST DNS request for known malware domain zelvesz.2u.se - Win.Trojan.Tempest (blacklist.rules) * 1:31174 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sapart variant outbound connection (malware-cnc.rules) * 1:31173 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules) * 1:31172 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules) * 1:31171 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Scarpnex variant outbound connection (malware-cnc.rules) * 1:31170 <-> ENABLED <-> BLACKLIST DNS request for known malware domain technopoleci.com - Win.Trojan.Cryptodefence (blacklist.rules) * 1:31169 <-> ENABLED <-> BLACKLIST DNS request for known malware domain lvpconveyors.co.uk - Win.Trojan.Cryptodefence (blacklist.rules) * 1:31168 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Guise outbound communication (malware-cnc.rules) * 1:31167 <-> DISABLED <-> PUA-ADWARE InstallRex bundled installer outbound activity (pua-adware.rules) * 1:31166 <-> DISABLED <-> PUA-ADWARE InstallRex bundled installer outbound activity (pua-adware.rules) * 1:31165 <-> ENABLED <-> BLACKLIST DNS request for known malware domain r1.getapplicationmy.info (blacklist.rules) * 1:31164 <-> ENABLED <-> BLACKLIST DNS request for known malware domain i1.megagetnews.net (blacklist.rules) * 1:31163 <-> ENABLED <-> BLACKLIST DNS request for known malware domain c1.downlloaddatamy.info (blacklist.rules) * 1:31162 <-> ENABLED <-> SERVER-OTHER Beetel 450TC2 CSRF attempt (server-other.rules) * 1:31161 <-> ENABLED <-> SERVER-OTHER AuraCMS LFI attempt (server-other.rules) * 1:31160 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31159 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31158 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31157 <-> ENABLED <-> SERVER-WEBAPP Cogent DataHub getpermissions.asp command injection attempt (server-webapp.rules) * 1:31156 <-> ENABLED <-> BLACKLIST DNS request for known malware domain smart.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31155 <-> ENABLED <-> BLACKLIST DNS request for known malware domain key.aggipulla.in - Win.Trojan.Fareit (blacklist.rules) * 1:31154 <-> ENABLED <-> BLACKLIST DNS request for known malware domain hotel.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31153 <-> ENABLED <-> BLACKLIST DNS request for known malware domain group.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31152 <-> ENABLED <-> BLACKLIST DNS request for known malware domain fly.aggipulla.in - Win.Trojan.Fareit (blacklist.rules) * 1:31151 <-> ENABLED <-> BLACKLIST DNS request for known malware domain code.aggipulla.com - Win.Trojan.Fareit (blacklist.rules) * 1:31150 <-> ENABLED <-> BLACKLIST User-Agent known malicious User-Agent DefaultBotPassword - Win.Trojan.Tirabot (blacklist.rules) * 1:31149 <-> DISABLED <-> SERVER-WEBAPP Supermicro Intelligent Management Controller login.cgi buffer overflow attempt (server-webapp.rules) * 1:31148 <-> DISABLED <-> SERVER-WEBAPP Supermicro Intelligent Management Controller login.cgi buffer overflow attempt (server-webapp.rules) * 1:31147 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zadnilay variant outbound connection (malware-cnc.rules)
* 1:29443 <-> ENABLED <-> EXPLOIT-KIT Fiesta exploit kit outbound connection attempt (exploit-kit.rules) * 1:30934 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit encrypted binary download (exploit-kit.rules) * 1:30935 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit landing page - specific structure (exploit-kit.rules) * 1:30936 <-> ENABLED <-> EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure (exploit-kit.rules)