[***] Summary: [***]

40 new OPEN, 48 new PRO (40 + 8) Apache Text4Shell RCE, Polonuim CnC,
Win32/WarHawk

Due to the observation of an internal holiday, there will be no release
on Friday October 21, 2022.

Thanks @sysdig, @pwntester, @InQuest, @pr0xylife, @Gi7w0rm

Please share issues, feedback, and requests at
https://feedback.emergingthreats.net/feedback

[+++] Added rules: [+++]

Open:

2039445 - ET USER_AGENTS Observed Uclient User-Agent (user_agents.rules)
2039446 - ET INFO Blokada DNS Over HTTPS Certificate Inbound (info.rules)
2039447 - ET INFO Brahma World DNS Over HTTPS Certificate Inbound
(info.rules)
2039448 - ET INFO Bortzmeyer DNS Over HTTPS Certificate Inbound
(info.rules)
2039449 - ET INFO Charter DNS Over HTTPS Certificate Inbound (info.rules)
2039450 - ET INFO CIRA Canadian Shield DNS Over HTTPS Certificate Inbound
(info.rules)
2039451 - ET INFO Cisco Umbrella (OpenDNS) DNS Over HTTPS Certificate
Inbound (info.rules)
2039452 - ET INFO Cisco Umbrella (OpenDNS) DNS Over HTTPS Certificate
Inbound (info.rules)
2039453 - ET INFO ControlId DNS Over HTTPS Certificate Inbound
(info.rules)
2039454 - ET INFO CZ.NIC DNS Over HTTPS Certificate Inbound (info.rules)
2039455 - ET INFO DigitalSize DNS Over HTTPS Certificate Inbound
(info.rules)
2039456 - ET INFO DNSlow DNS Over HTTPS Certificate Inbound (info.rules)
2039457 - ET INFO DNSPod DNS Over HTTPS Certificate Inbound (info.rules)
2039458 - ET INFO DnsCrypt DNS Over HTTPS Certificate Inbound (info.rules)
2039459 - ET INFO DnsCrypt DNS Over HTTPS Certificate Inbound (info.rules)
2039460 - ET INFO DNS For Family DNS Over HTTPS Certificate Inbound
(info.rules)
2039461 - ET INFO DNSForge DNS Over HTTPS Certificate Inbound (info.rules)
2039462 - ET INFO dnsHome DNS Over HTTPS Certificate Inbound (info.rules)
2039463 - ET INFO DNSlify DNS Over HTTPS Certificate Inbound (info.rules)
2039464 - ET EXPLOIT Possible Apache Text4shell RCE Attempt Script Prefix
(CVE-2022-42889) (Inbound) (exploit.rules)
2039465 - ET EXPLOIT Possible Apache Text4shell RCE Attempt Script Prefix
(CVE-2022-42889) (Outbound) (exploit.rules)
2039466 - ET EXPLOIT Possible Apache Text4shell RCE Attempt DNS Prefix
(CVE-2022-42889) (Inbound) (exploit.rules)
2039467 - ET EXPLOIT Possible Apache Text4shell RCE Attempt DNS Prefix
(CVE-2022-42889) (Outbound) (exploit.rules)
2039468 - ET EXPLOIT Possible Apache Text4shell RCE Attempt URL Prefix
(CVE-2022-42889) (Inbound) (exploit.rules)
2039469 - ET EXPLOIT Possible Apache Text4shell RCE Attempt URL Prefix
(CVE-2022-42889) (Outbound) (exploit.rules)
2039470 - ET EXPLOIT Possible Apache Text4shell RCE Attempt URL Prefix
(CVE-2022-42889) (Inbound) (exploit.rules)
2039471 - ET EXPLOIT Possible Apache Text4shell RCE Attempt URL Prefix
(CVE-2022-42889) (Outbound) (exploit.rules)
2039472 - ET INFO URL Shortener Service Domain in DNS Lookup (rebrand
.ly) (info.rules)
2039473 - ET INFO URL Shortener Service Domain in DNS Lookup (bitly .ws)
(info.rules)
2039474 - ET INFO URL Shortener Service Domain in DNS Lookup (is .gd)
(info.rules)
2039475 - ET INFO URL Shortener Service Domain in DNS Lookup (snip .ly)
(info.rules)
2039476 - ET MALWARE Suspected POLONIUM CnC Domain (consulting-ukraine
.tk) in DNS Lookup (malware.rules)
2039477 - ET MALWARE Suspected POLONIUM CnC Domain (ukrsupport .info) in
DNS Lookup (malware.rules)
2039478 - ET MALWARE Suspected Polonium CnC Initial Checkin M1
(malware.rules)
2039479 - ET MALWARE Suspected Polonium CnC Initial Checkin M2
(malware.rules)
2039480 - ET MALWARE Suspected Polonium CnC Checkin (get_cmd)
(malware.rules)
2039481 - ET MALWARE Suspected Polonium CnC Checkin (result.php - process
list) M1 (malware.rules)
2039482 - ET MALWARE Suspected Polonium CnC Checkin (result.php - process
list) M2 (malware.rules)
2039483 - ET PHISHING Successful mail .ru Credential Phish
(phishing.rules)
2039484 - ET MALWARE SocGholish CnC Domain in DNS Lookup (discover
.jsfconnections .com) (malware.rules)

Pro:

2852634 - ETPRO COINMINER CoinMiner Known Malicious Stratum Authline
(2022-10-19 1) (coinminer.rules)
2852635 - ETPRO MALWARE Win32/WarHawk Checkin Activity (malware.rules)
2852636 - ETPRO MALWARE Win32/WarHawk Activity (ping) (malware.rules)
2852637 - ETPRO MALWARE Win32/WarHawk Activity (task) (malware.rules)
2852638 - ETPRO MALWARE Win32/WarHawk Activity (cmd) (malware.rules)
2852639 - ETPRO MALWARE Win32/WarHawk Activity (filemgr) (malware.rules)
2852640 - ETPRO MALWARE Win32/WarHawk Activity (filemgr) M2
(malware.rules)
2852641 - ETPRO MALWARE Win32/WarHawk Activity (fileupload)
(malware.rules)

[///] Modified active rules: [///]

2039422 - ET USER_AGENTS Supicious User-Agent (RT/1.0) (user_agents.rules)
2844078 - ETPRO MALWARE Win32/Agentb.jzps CnC Host Checkin (malware.rules)

[///] Modified inactive rules: [///]

2001980 - ET POLICY SSH Client Banner Detected on Unusual Port
(policy.rules)

Date:
Summary title:
40 new OPEN, 48 new PRO (40 + 8) Apache Text4Shell RCE, Polonuim CnC, Win32/WarHawk