This SRU number: 2014-09-17-002
Previous SRU number: 2014-09-15-001
Applies to:
This SEU number: 1172
Previous SEU: 1170
Applies to:
This is the complete list of rules added in SRU 2014-09-17-002 and SEU 1172.
The format of the file is:
GID - SID - Rule Group - Rule Message - Policy State
The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.
The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.
Note: Unless stated explicitly, the rules are for the series of products listed above.
GID | SID | Rule Group | Rule Message | Policy State | ||
---|---|---|---|---|---|---|
Con. | Bal. | Sec. | ||||
1 | 31907 | MALWARE-CNC | Win.Trojan.MSIL.Honerep variant outbound connection attempt | off | drop | drop |
1 | 31908 | BLACKLIST | DNS request for known malware domain recoalmeida.gratisphphost.info - Win.Trojan.Basostab | off | drop | drop |
1 | 31909 | MALWARE-CNC | Win.Trojan.Basostab variant outbound connection | drop | drop | drop |
1 | 31910 | DELETED | MALWARE-CNC Win.Trojan.Kanav variant outbound connection | |||
1 | 31911 | MALWARE-CNC | Win.Trojan.MSIL.Gareme variant outbound connection attempt | off | drop | drop |
1 | 31912 | SERVER-WEBAPP | cPanel 9.01 multiple URI parameters cross site scripting attempt | off | off | off |
1 | 31913 | MALWARE-CNC | Win.Trojan.Maozhi variant outbound connection | off | drop | drop |
1 | 31914 | SERVER-WEBAPP | Microsoft ASP.NET null byte injection attempt | off | off | off |
1 | 31915 | MALWARE-CNC | WIN.Trojan.Ziyazo variant outbound connection | off | drop | drop |
1 | 31916 | MALWARE-CNC | WIN.Trojan.Ziyazo variant outbound connection | off | drop | drop |
1 | 31917 | BLACKLIST | DNS request for known malware domain vampire123.zapto.org - Win.Trojan.Disfa | off | drop | drop |
1 | 31918 | BLACKLIST | DNS request for known malware domain enemydont.net - Win.Trojan.Symmi | off | drop | drop |
1 | 31919 | BLACKLIST | DNS request for known malware domain saltsecond.net - Win.Trojan.Symmi | off | drop | drop |
1 | 31920 | BLACKLIST | DNS request for known malware domain sellsmall.net - Win.Trojan.Symmi | off | drop | drop |
1 | 31921 | BLACKLIST | DNS request for known malware domain southblood.net - Win.Trojan.Symmi | off | drop | drop |
1 | 31922 | BLACKLIST | DNS request for known malware domain wheelreply.net - Win.Trojan.Symmi | off | drop | drop |
1 | 31923 | MALWARE-CNC | Win.Trojan.Symmi variant HTTP response attempt | off | drop | drop |
1 | 31924 | MALWARE-CNC | Win.Trojan.Symmi variant outbound connection attempt | off | drop | drop |
1 | 31925 | MALWARE-CNC | Linux.Trojan.Jynxkit outbound communication | off | drop | drop |
1 | 31926 | FILE-OFFICE | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt | off | drop | drop |
1 | 31927 | FILE-OFFICE | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt | off | drop | drop |
Updated rules can be found at this link.