-
Notifications
You must be signed in to change notification settings - Fork 1
/
PAW-PATRULES_EGREGOR_IP.rules
46 lines (45 loc) · 7.15 KB
/
PAW-PATRULES_EGREGOR_IP.rules
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# KXK00OOkxxkO00KX0
# ,NXKxo:,'... ...';cdOXN:
# l;. ..,:ldxkOOOOOOkkxol:,.. .o
# dk lOOOOOOkkkkkkkkkkkOOOOOOx dk
# KNXOc. :0OkkkkkkkkkkkkkkkkkkkkkO0l. :kXNX
# x. .'ckOOkkkkkkkkkkkookkkkkkkkkkOOOl,. .k
# d. o0Okkkkkkkkkkkkk. okkkkkkkkkkOO0k x
# l. c0kkkkkkko. .ckk .kd..'xkkkkkk0x .o
# ;, ;0kkkkkkkc ;ko. .dk. :kkkkkk0l ':
# .l .OOkkkkkkkl. .lkocldkkl. 'xkkkkkOO, c.
# l o0kkkk:..'dkkk. .;okkkkkkkkk0x l
# .: .OOkkk; xk, .:kkkkkO0; ;.
# ;. :0kkkko;,cko :kkkk0d .:
# : oOkkkkkkkk .dkkk0k. :
# : dOkkkkkkk .:odxkkkkkOk. ;
# ; oOkkkkkkx:,,ckkkkkkkkkkOx. ,
# '. ;OOkkkkkkkkkkkkkkkkkOOc '
# ' .lOOkkkkkkkkkkkkkOOd. .
# . .lOOkkkkkkkkkOOo' ..
# ' .;dOOOkOOOx:. .
# .. .,lxo;. ..
# .. ..
#
# ____ ___ __ ____ _ _
#| _ \ / \ \ / / | _ \ __ _| |_ _ __ _ _| | ___ ___
#| |_) / _ \ \ /\ / / | |_) / _` | __| '__| | | | |/ _ \/ __|
#| __/ ___ \ V V / | __/ (_| | |_| | | |_| | | __/\__ \
#|_| /_/ \_\_/\_/ |_| \__,_|\__|_| \__,_|_|\___||___/
#
# IDS Rules for Suricata
# 📜 Charles BLANC-ROLIN ⠵ - https://pawpatrules.fr - https://www.apssis.com - https://github.com/woundride
# Licence CC BY-NC-SA 4.0 : https://creativecommons.org/licenses/by-nc-sa/4.0/
# 🔒 Egregor ransomware - IP
alert ip any any -> 185.238.0.233 any (msg:"🐾 - 🚨 Outgoing connection ↗ possible DLL downloading 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/ioc/CERTFR-2020-IOC-006/; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306801; rev:1; classtype:trojan-activity;)
alert ip any any -> 45.153.242.129 any (msg:"🐾 - 🚨 Outgoing connection ↗ possible DLL downloading 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/ioc/CERTFR-2020-IOC-006/; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306802; rev:1; classtype:trojan-activity;)
alert ip any any -> 49.12.104.241 any (msg:"🐾 - 🚨 Outgoing connection ↗ possible DLL downloading 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/ioc/CERTFR-2020-IOC-006/; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306803; rev:1; classtype:trojan-activity;)
alert ip any any -> 45.138.172.140 any (msg:"🐾 - 🚨 Outgoing connection ↗ possible DLL downloading 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/ioc/CERTFR-2020-IOC-006/; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306804; rev:1; classtype:trojan-activity;)
alert ip any any -> 45.11.19.70 any (msg:"🐾 - 🚨 Outgoing connection ↗ possible DLL downloading 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/ioc/CERTFR-2020-IOC-006/; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306805; rev:1; classtype:trojan-activity;)
alert ip any any -> 217.8.117.148 any (msg:"🐾 - 🚨 Outgoing connection ↗ possible DLL downloading 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306806; rev:1; classtype:trojan-activity;)
alert ip any any -> 93.190.140.75 any (msg:"🐾 - 🚨 Outgoing connection ↗ exfiltration de données possible 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306807; rev:1; classtype:trojan-activity;)
alert ip any any -> 23.254.229.82 any (msg:"🐾 - 🚨 Outgoing connection ↗ C2 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306808; rev:1; classtype:trojan-activity;)
alert ip any any -> 192.236.209.151 any (msg:"🐾 - 🚨 Outgoing connection ↗ C2 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306809; rev:1; classtype:trojan-activity;)
alert ip any any -> 217.138.219.138 any (msg:"🐾 - 🚨 Outgoing connection ↗ C2 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306810; rev:1; classtype:trojan-activity;)
alert ip any any -> 185.212.170.158 any (msg:"🐾 - 🚨 Outgoing connection ↗ C2 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306811; rev:1; classtype:trojan-activity;)
alert ip any any -> 23.106.215.67 any (msg:"🐾 - 🚨 Outgoing connection ↗ C2 🔒 Egregor ransomware"; reference: url,https://www.cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-012/; reference: url,https://digital.nhs.uk/cyber-alerts/2020/cc-3681; reference: url,https://www.intrinsec.com/egregor-prolock/; metadata:created_at 2020_12_24, updated_at 2020_12_24; sid:3306812; rev:1; classtype:trojan-activity;)