Snort mailing list archives

Multiple signatures 010


From: Y M via Snort-sigs <snort-sigs () lists snort org>
Date: Mon, 20 Aug 2018 11:28:28 +0000

Hi,

Pcaps are available for some of the signatures below.

# --------------------
# Date: 2018-08-16
# Title: CVE-2018-15138
# Reference:
#    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15138
#    - https://www.exploit-db.com/exploits/45167/
# Tests: syntax only

alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP LG-Ericsson iPECS NMS 30M directory traversal 
attempt"; flow:to_server,established; content:"/ipecs-cm/download?filename="; fast_pattern:only; http_uri; 
content:"../"; http_uri; metadata:ruleset community, service http; reference:cve,2018-15138; 
reference:url,cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15138; classtype:web-application-attack; sid:8000258; 
rev:1;)

# --------------------
# Date: 2018-08-16
# Title: CVE-2018-14417
# Reference:
#    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14417
#    - https://www.exploit-db.com/exploits/45097/
# Tests: syntax only

alert tcp any any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP SoftNAS Cloud OS unauthenticated command injection 
attempt"; flow:to_server,established; content:"/softnas/snserver/snserv.php?"; fast_pattern:only; http_uri; 
content:"opcode="; http_uri; content:"&recentVersion="; http_uri; content:"|3B|"; within:50; content:"Referer"; 
http_header; reference:cve,2018-14417; reference:url,cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14417; 
classtype:attempted-admin; sid:8000259; rev:1;)

# --------------------
# Date: 2018-08-16
# Title: PowerShell-weaponized documents with specific User-Agents
# Tests: pcap
# Reference: Research
#    - 6092a5e9860e0bac2c564412b123c06c5a34d359a7682b718bfd0473b9d20745
#    - 629f2a5df32333dc62d74efa1810ee0389076f0767dbe886b53e02564258e139
#    - 35e7d5b699fc0e764d961446e6d4cd9cfee35eae73a5948fb4121498ce136757
# Confidence: medium+

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Vbs.Downloader.Valyria known malicious 
PowerShell user-agent string"; flow:to_server,established; content:"User-Agent|3A| USRUE-VNC"; fast_pattern:only; 
http_header; metadata:ruleset community, service http; classtype:trojan-activity; sid:8000260; rev:1;)

# --------------------
# Date: 2018-08-19
# Title: AZORult variant + Hermes 2.1 Rasonmware
# Tests: pcap
# Reference: Research
#    Droppers:
#        - 941fa514a76b8151976d00d96835c4d4dc237868e61cca01fa8be1c9f4459171
#        - a77ce243c5501e94850c25e2c4a1028021a8d12d5814958afe4fce86f31b4e43
#        - 5d5fef9da137ff5fed605d3929a33c5dcdde5d14aa75435e6a1e5bfdf0a96cdc
#        - f278a67664691d9f4e701155a90d39b0a3768b0f675024b18e7046c36a54f081
#        - 347afe983779b6657766e6260ae6bb12d70b7b6bc079aeee35c55a1c9d88c3e6
#        - 7c1a4b2ac3940c033e345f41780059b04a979ccb7246cf6e6614e798aed067b1
#        - 05e3783379157ed6bdc936f306d14b23927b6f682273d37f490349990532c305
#    AZOrult:
#        - a7b8e4988e9da83ac55b4613bff4bccca62e208c2fed0c850ca024163b27dc09
#    Hermes:
#        - 2698c141c7fb2660fd009ce9c083022a531c28c8ae8258555027a2f7852de13d
# Confidence: medium+
# Notes: SID 8000194 (MALWARE-CNC Win.Trojan.GenKryptik) submitted earlier successfully
#        triggered on AZORult traffic.

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.AZORult variant outbound connection"; 
flow:to_server,established; urilen:10; content:"/index.php"; nocase; http_uri; content:"MSIE 6.0"; nocase; http_header; 
content:"|2F FB|"; fast_pattern:only; http_client_body; metadata:ruleset community, service http; 
classtype:trojan-activity; sid:8000261; rev:1;)

# --------------------
# Date: 2018-08-19
# Title: CVE-2018-8373
# Reference:
#    - https://ti.360.net/blog/articles/analyzing-attack-of-cve-2018-8373-and-darkhotel/
#    - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8373
#    - 
https://blog.trendmicro.com/trendlabs-security-intelligence/use-after-free-uaf-vulnerability-cve-2018-8373-in-vbscript-engine-affects-internet-explorer-to-run-shellcode/
# Tests: syntax only

alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"BROWSER-IE Microsoft Internet Explorer VBScript remote 
code execution attempt"; flow:to_client,established; file_data; content:"class"; nocase; content:"Class_Initialize"; 
within:60; content:"ReDim"; nocase; content:"Preserve"; within:150; nocase; metadata:ruleset community, service 
ftp-data, service http, service imap, service pop3; reference:cve,2018-8373; 
reference:url,portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8373; classtype:attempted-admin; 
sid:8000262; rev:1;)

# --------------------
# Date: 2018-08-19
# Title: New modular downloaders fingerprint systems, prepare for more - Part 1: Marap
# Tests: pcap
# Reference:
#    - 
https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap
#    - https://twitter.com/anyrun_app/status/1030515699410710528 : 
https://app.any.run/tasks/40bfffd2-8f8b-4e85-ab1a-212c803a459c

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Marap outbound connection"; 
flow:to_server,established; urilen:8; content:"/dot.php"; fast_pattern:only; http_uri; content:"param="; depth:6; 
http_client_body; metadata:ruleset community, service http; 
reference:url,www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap;
 classtype:trojan-activity; sid:8000263; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Marap outbound connection"; 
flow:to_server,established; content:"POST"; http_method; content:".enc HTTP/1.1"; content:"Content-Type: 
application/x-www-form-urlencoded"; http_header; content:"Content-Length: 0"; http_header; metadata:ruleset community, 
service http; 
reference:url,www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap;
 classtype:trojan-activity; sid:8000264; rev:1;)

# --------------------
# Date: 2018-08-19
# Title: KeyPass ransomware
# Tests: pcap
# Reference:
#    - https://securelist.com/keypass-ransomware/87412/

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Ransomware.KeePass get encryption key 
outbound request"; flow:to_server,established; content:"GET /get.php HTTP/1.0"; fast_pattern:only; 
content:!"User-Agent"; http_header; metadata:ruleset community, service http; 
reference:url,securelist.com/keypass-ransomware/87412/; classtype:trojan-activity; sid:8000265; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC Win.Ransomware.KeePass receive encryption key 
inbound request"; flow:to_client,established; file_data; content:"|7B 22|line1|22|"; fast_pattern:only; 
content:"|22|line2|22|"; metadata:ruleset community, service http; 
reference:url,securelist.com/keypass-ransomware/87412/; classtype:trojan-activity; sid:8000266; rev:1;)

Thanks.
YM
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: