Today Talos is releasing coverage to detect exploitation attempts of Microsoft Office ActiveX control abuse, designated under CVE-2021-40444. Coverage is being released as SIDs 58120-58129 and native Snort 3 SID 300049. Talos may release additional coverage in the future as the situation develops and new guidance is created.
Talos has added and modified multiple rules in the file-office, malware-cnc, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091800.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules) * 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules) * 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules) * 3:58110 <-> ENABLED <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected (policy-other.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (snort3-server-webapp.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (snort3-malware-cnc.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (snort3-malware-cnc.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (snort3-malware-cnc.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (snort3-malware-cnc.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (snort3-malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (snort3-server-webapp.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (snort3-server-webapp.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (snort3-os-windows.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (snort3-file-office.rules)
* 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (snort3-os-windows.rules) * 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (snort3-os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58123 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58115 <-> ENABLED <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection (malware-cnc.rules) * 1:58112 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58124 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58121 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58127 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58122 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58128 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58117 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58129 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58118 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58111 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt (server-webapp.rules) * 1:58126 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58116 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection (malware-cnc.rules) * 1:58120 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58125 <-> ENABLED <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt (file-office.rules) * 1:58119 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection (malware-cnc.rules) * 1:58114 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:58113 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt (server-webapp.rules)
* 1:57965 <-> ENABLED <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected (os-windows.rules) * 1:57966 <-> ENABLED <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt (os-windows.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.7.0.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.9.0.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:300049 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 3:58110 <-> POLICY-OTHER Cisco BroadWorks administrator account modification detected * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58114 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:58115 <-> MALWARE-CNC Win.Trojan.AveMaria variant outbound connection * 1:58116 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58117 <-> MALWARE-CNC Win.Trojan.Ursu variant outbound connection * 1:58118 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58119 <-> MALWARE-CNC Win.Dropper.Johnnie variant outbound connection * 1:58120 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58121 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58122 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58123 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58124 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58125 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58126 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58127 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58128 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt * 1:58129 <-> FILE-OFFICE Microsoft MSHTML ActiveX control bypass attempt
* 1:57965 <-> OS-WINDOWS Microsoft Windows EFSRPC bind detected * 1:57966 <-> OS-WINDOWS Microsoft Windows NTLM relay attack attempt