Talos Rules 2018-12-04
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-ie, malware-cnc, malware-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.

Change logs

2018-12-04 15:21:16 UTC

Snort Subscriber Rules Update

Date: 2018-12-04

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091200.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48468 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48467 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48466 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48465 <-> ENABLED <-> MALWARE-CNC Js.Worm.Bondat inbound connection attempt (malware-cnc.rules)
 * 1:48464 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48463 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48462 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48461 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48469 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 3:48460 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)
 * 3:48458 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2018-0733 attack attempt (server-other.rules)
 * 3:48459 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)
 * 3:48456 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)
 * 3:48457 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)

Modified Rules:



2018-12-04 15:21:16 UTC

Snort Subscriber Rules Update

Date: 2018-12-04

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48468 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48465 <-> ENABLED <-> MALWARE-CNC Js.Worm.Bondat inbound connection attempt (malware-cnc.rules)
 * 1:48464 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48466 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48467 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48469 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48461 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48462 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48463 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 3:48457 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)
 * 3:48456 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)
 * 3:48460 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)
 * 3:48458 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2018-0733 attack attempt (server-other.rules)
 * 3:48459 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)

Modified Rules:



2018-12-04 15:21:16 UTC

Snort Subscriber Rules Update

Date: 2018-12-04

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091100.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48464 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48466 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48467 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48462 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48469 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48461 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48468 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48465 <-> ENABLED <-> MALWARE-CNC Js.Worm.Bondat inbound connection attempt (malware-cnc.rules)
 * 1:48463 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 3:48460 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)
 * 3:48458 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2018-0733 attack attempt (server-other.rules)
 * 3:48459 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)
 * 3:48457 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)
 * 3:48456 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)

Modified Rules:



2018-12-04 15:21:16 UTC

Snort Subscriber Rules Update

Date: 2018-12-04

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48467 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (snort3-malware-cnc.rules)
 * 1:48466 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (snort3-malware-cnc.rules)
 * 1:48469 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (snort3-malware-other.rules)
 * 1:48468 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (snort3-malware-other.rules)
 * 1:48462 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (snort3-malware-cnc.rules)
 * 1:48463 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (snort3-malware-cnc.rules)
 * 1:48461 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (snort3-malware-cnc.rules)
 * 1:48465 <-> ENABLED <-> MALWARE-CNC Js.Worm.Bondat inbound connection attempt (snort3-malware-cnc.rules)
 * 1:48464 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (snort3-malware-cnc.rules)

Modified Rules:



2018-12-04 15:21:16 UTC

Snort Subscriber Rules Update

Date: 2018-12-04

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48463 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48466 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48467 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48464 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48469 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48468 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48461 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48462 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48465 <-> ENABLED <-> MALWARE-CNC Js.Worm.Bondat inbound connection attempt (malware-cnc.rules)
 * 3:48458 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2018-0733 attack attempt (server-other.rules)
 * 3:48459 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)
 * 3:48460 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)
 * 3:48456 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)
 * 3:48457 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)

Modified Rules:



2018-12-04 15:21:16 UTC

Snort Subscriber Rules Update

Date: 2018-12-04

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48464 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48466 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 1:48461 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48469 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48463 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48462 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Zebrocy variant outbound connection (malware-cnc.rules)
 * 1:48465 <-> ENABLED <-> MALWARE-CNC Js.Worm.Bondat inbound connection attempt (malware-cnc.rules)
 * 1:48468 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.tRat variant inbound payload attempt (malware-other.rules)
 * 1:48467 <-> ENABLED <-> MALWARE-CNC Win.Trojan.tRat variant outbound cnc connection (malware-cnc.rules)
 * 3:48457 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)
 * 3:48459 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)
 * 3:48458 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2018-0733 attack attempt (server-other.rules)
 * 3:48456 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0730 attack attempt (server-webapp.rules)
 * 3:48460 <-> ENABLED <-> BROWSER-IE TRUFFLEHUNTER TALOS-2018-0734 attack attempt (browser-ie.rules)

Modified Rules: