Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2015-05-12

This SRU number: 2015-05-12-002
Previous SRU number: 2015-05-06-001

Applies to:

This SEU number: 1295
Previous SEU: 1292

Applies to:

This is the complete list of rules modified in SRU 2015-05-12-002 and SEU 1295.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

Updated Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
126294FILE-OTHERWatering Hole Campaign applet downloaddropdropdrop
126295FILE-OTHERWatering Hole Campaign applet downloaddropdropdrop
126380MALWARE-OTHERUTF-8 BOM in zip file attachment detectedoffoffdrop
126381MALWARE-OTHERUTF-8 BOM in zip file attachment detectedoffoffdrop
126382MALWARE-OTHERUTF-8 BOM in zip file attachment detectedoffoffdrop
126837MALWARE-CNCBitBot Idle C2 responseoffdropdrop
126850BROWSER-IEMicrosoft Internet Explorer IE5 compatibility mode enable attemptoffoffdrop
127966MALWARE-CNCWin.Backdoor.Chopper web shell connectionoffdropdrop
127967MALWARE-CNCWin.Backdoor.Chopper web shell connectionoffoffoff
127968MALWARE-CNCWin.Backdoor.Chopper web shell connectionoffdropdrop
127980BLACKLISTURI request for known malicious URI - /botnet/adduser.php?uid=offdropdrop
127981BLACKLISTURI request for known malicious URI - /botnet/tasks.php?uid=offdropdrop
128247MALWARE-CNCWin.Trojan.Dropper variant outbound connectionoffdropdrop
128323MALWARE-CNCWin.Backdoor.Chopper web shell connectionoffdropdrop
128362BLACKLISTUser-Agent known malicious user-agent string SUiCiDE/1.5offdropdrop
128479BLACKLISTDNS request for known malware domain liumingzhen.zapto.orgoffoffoff
128480BLACKLISTDNS request for known malware domain liumingzhen.myftp.orgoffoffoff
128481BLACKLISTDNS request for known malware domain catlovers.25u.comoffoffoff
128482MALWARE-CNCWin.Trojan.Terminator RAT variant outbound connectiondropdropdrop
130989BLACKLISTDNS request for known malware domain help.2012hi.hkoffdropdrop
130990MALWARE-CNCShiqiang Gang malicious XLS targeted attack detectiondropdropdrop
130991MALWARE-CNCShiqiang Gang malicious XLS targeted attack detectionoffdropdrop
134238SERVER-OTHERPHP zip_cdir_new function integer overflow file upload attemptoffoffoff
134239SERVER-OTHERPHP zip_cdir_new function integer overflow file upload attemptoffoffoff
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
15789BLACKLISTUser-Agent known malicious user agent - ActMonoffoffoff
120436MALWARE-TOOLSTHC SSL renegotiation DOS attemptoffoffoff
120437MALWARE-TOOLSTHC SSL renegotiation DOS attemptoffoffoff
120438MALWARE-TOOLSTHC SSL renegotiation DOS attemptoffoffoff
120439MALWARE-TOOLSTHC SSL renegotiation DOS attemptoffoffoff
133769OS-WINDOWSMicrosoft Windows NtUserfnINSTRINGNULL memory leak kernel ASLR bypass attemptoffdropdrop
133770OS-WINDOWSMicrosoft Windows NtUserfnINSTRINGNULL memory leak kernel ASLR bypass attemptoffdropdrop