CONTACT US
forrester wave report 2023

Close your ransomware case with Open NDR

SEE HOW

ad-nav-crowdstrike

Corelight now powers CrowdStrike solutions and services

READ MORE

ad-images-nav_0013_IDS

Alerts, meet evidence.

LEARN MORE ABOUT OUR IDS SOLUTION

ad-images-nav_white-paper

5 Ways Corelight Data Helps Investigators Win

READ WHITE PAPER

cloud-network

Corelight announces cloud enrichment for AWS, GCP, and Azure

READ MORE

corelight partner programe guide

Corelight's partner program

VIEW PROGRAM

glossary-icon

10 Considerations for Implementing an XDR Strategy

READ NOW

ad-images-nav_0006_Blog

Don't trust. Verify with evidence

READ BLOG

video

The Power of Open-Source Tools for Network Detection and Response

WATCH THE WEBCAST

ad-nav-ESG

The Evolving Role of NDR

DOWNLOAD THE REPORT

ad-images-nav_0006_Blog

Detecting 5 Current APTs without heavy lifting

READ BLOG

g2-medal-best-support-spring-2024

Network Detection and Response

SUPPORT OVERVIEW

 

Feed me!

Corelight has strengthened the Suricata integration within its Open NDR Platform, empowering customers with a custom ruleset, the Corelight Feed, designed to swiftly detect and help respond to emerging threats. With a new monthly update cycle, Corelight ensures that organizations stay ahead of the latest vulnerabilities and enhance their network security posture effortlessly.

Just over four years ago, Corelight launched our Suricata integration , bringing together two of the most powerful and widely used open-source network security tools into our Open NDR Platform--Zeek and Suricata. Our Suricata integration goes well beyond simply running the two engines side by side. By fusing the alerts from Suricata with the powerful contextual data from Zeek, we create a combined log to help analysts triage and respond to alerts more quickly. This tight coupling also helps integrate with our Smart PCAP product and other features of our platform.

Of course Suricata is an Intrusion detection system , which requires loading rules to trigger alerts, so. . . what rules do our customers typically use, and how do they get them?

Most of our customers license Proofpoint’s Emerging Threats (ET) Pro rules feed from Corelight, as it’s one of the most widely used rulesets for Suricata, spanning more than 80,000 rules targeting attack tools, malware, phishing, and much more. ET Pro is a fantastic resource and, we’ve also dedicated resources to examining and tuning the rules specifically for our customers to get the most value from them right out of the gate. We provide a “Day 1” tuned ruleset, continuously adapted based on our own customer feedback and testing, which is an excellent starting point to balance signal and noise. We also make it extremely easy to enable and tune your complete Suricata ruleset within our Fleet Manager product.

Making ET Pro available (and providing a recommended ruleset for our customers) is only one component of Corelight’s approach to Suricata rules, though. We also offer the Corelight Feed.

What is the Corelight Feed?

Our company has developed its own proprietary ruleset, the Corelight Feed, available to all our Suricata customers. Designed by the Corelight Labs team, the Corelight Feed focuses on rapid response to emerging threats, including zero-day exploits, lateral movement and more. With nearly 350 custom rules (and we’re always adding more) that cover nine categories and 50 unique TTPs of MITRE ATT&CK, the Corelight Feed is a powerful tool that enables customers to respond swiftly and decisively to network threats.

Rules update highlights

For the Corelight Feed, we’re now going to be using a monthly release cycle (with exceptions for out-of-band rapid response content that greatly benefits from near-immediate distribution). You can now expect regular emails detailing the new rules and any significant changes to the Corelight Feed process.

As we’ve just made some big changes this month, below you’ll see the text of the update email that will be going out shortly to all of our Corelight Suricata customers.

It’s worth noting a few important things from this latest release:

  • We’re migrating the name of our lateral rules from CORELIGHT 3CORESec LATERAL -> CORELIGHT LATERAL. This reflects that we’ve taken ownership of these rules entirely within Corelight (where we previously licensed them from 3CoreSec)
    • Existing 3CORESec rules in sid range 2620186 - 2620554 have been moved to Corelight sid range 3000147 - 3000281
    • IMPORTANT NOTE: Please update any saved searches using the sid range 2620186 - 2620554, as they will be retired in 3 months
  • Lateral: Dozens of new rules for attack frameworks and LOL techniques utilizing SMB, MSSQL, and DCE/RPC
  • Exploits: New rapid response coverage for vulnerabilities in ServiceNow, Citrix, Cisco, MOVEit and more. These help cover some recent newsmaking vulnerabilities as well as some old “favorites” being reused in campaigns like Volt Typhoon
  • Malware: New or enhanced coverage for Mythic, Covenant and a bunch of (dirty) RATs

How do I enable Corelight Feed and make sure I’m using these rules?

You can enable the Corelight Feed in the Suricata rules management section within Fleet Manager. Under the “Enable Suricata Automation” section, you’ll see “Corelight Feed” at the top. Just make sure that’s enabled and the Corelight Feed will stay updated along with the rest of your configured rulesets.

 

To confirm that the rules are being used, you can check the Suricata Rules editor and use the File Name search for “corelight.rules”:

 

Where do I find more information about Corelight’s Suricata rules and how to configure them?

Please visit this link in our Corelight Support portal , where you will find a section dedicated to explaining the rules management process, FAQs, and further details.

 

Rule update July 2024 notes

What’s new in this release?

Changed rules

Migration from CORELIGHT 3CORESec LATERAL -> CORELIGHT LATERAL Existing 3CORESec rules in sid range 2620186 - 2620554 have been copied to Corelight sid range 3000147 - 3000281. Please update any saved searches using the sid range 2620186 - 2620554, as they will be retired in 3 months.

New rules

92 new rules offering coverage exclusive to this ruleset.

New LATERAL coverage

    
     

3000061 - CORELIGHT LATERAL AiTM Responder HTTP server harvesting NTLM hashes after Local mDNS/LMMR poisoning (M1) https://attack.mitre.org/software/S0174/

3000062 - CORELIGHT LATERAL AiTM Responder HTTP server harvesting NTLM hashes after Local mDNS/LMMR poisoning (M2) https://attack.mitre.org/software/S0174/

3000083 - CORELIGHT LATERAL MSSQL Admin Role Check (IS_SRVROLEMEMBER)

3000084 - CORELIGHT LATERAL CrackMapExec MSSQL Artifact 2.1 (sp_configure set)

3000085 - CORELIGHT LATERAL CrackMapExec MSSQL Artifact 2.2 (sp_configure unset)

3000086 - CORELIGHT LATERAL MSSQL xp_cmdshell Stored Procudure Successfully Enabled

3000087 - CORELIGHT LATERAL CrackMapExec Style AMSI Bypass Observed

3000088 - CORELIGHT LATERAL CrackMapExec MSSQL Artifact 3.0 (xp_cmdshell + downloadstring)

3000089 - CORELIGHT LATERAL CrackMapExec MSSQL Artifact 3.1 (xp_cmdshell + downloadstring)

3000090 - CORELIGHT LATERAL CrackMapExec MSSQL Artifact 3.2 (xp_cmdshell + downloadstring)

3000091 - CORELIGHT LATERAL CrackMapExec MSSQL Ping Reply

3000092 - CORELIGHT LATERAL impacket MSSQL Username Check

3000093 - CORELIGHT LATERAL MSSQL sa Account Brute Force Attempt (UTF-8)

3000094 - CORELIGHT LATERAL MSSQL Account Brute Force Attempt (UTF-8)

3000095 - CORELIGHT LATERAL MSSQL sa Account Brute Force Attempt (UTF-16LE)

3000096 - CORELIGHT LATERAL MSSQL Account Brute Force Attempt (UTF-16LE)

3000097 - CORELIGHT LATERAL MSSQL Brute Force Attempt (squelda 1.0)

3000098 - CORELIGHT LATERAL MSSQL Metasploit Style Blank Password Check (mssql_enum)

3000099 - CORELIGHT LATERAL MSSQL Metasploit Style Command Execution (mssql_exec sp_oacreate)

3000100 - CORELIGHT LATERAL MSSQL Attempted Command Execution (xp_cmdshell)

3000101 - CORELIGHT LATERAL MSSQL Nmap NSE Client

3000102 - CORELIGHT LATERAL Impacket smbexec Artifact in SMB (UTF16-LE __output in Create Request)

3000103 - CORELIGHT LATERAL Impacket smbexec Artifact in SMB (ASCII __output in Create Request)

3000104 - CORELIGHT LATERAL SMB CreateServiceW Suspicious Binary Path

3000105 - CORELIGHT LATERAL Impacket dcomexec Remote Shell Artifacts

3000106 - CORELIGHT LATERAL Covenant C2 Framework HTTP Beacon (default C2 profile)

3000107 - CORELIGHT LATERAL Covenant C2 Framework HTTP Beacon Response (default C2 profile)

3000108 - CORELIGHT LATERAL Covenant Grunt Implant Copied to Fileshare

3000109 - CORELIGHT LATERAL Shellcode Launcher Artifacts in DCERPC

3000110 - CORELIGHT LATERAL SMB Create iertutil.dll Possible DLL Hijacking

3000111 - CORELIGHT LATERAL SMB Create wbemcomn.dll Possible DLL Hijacking

3000112 - CORELIGHT LATERAL SMB CreateServiceA With SharpSC Artifacts

3000131 - CORELIGHT LATERAL [ANY.RUN] Impacket SMB Server GUID

3000135 - CORELIGHT LATERAL NTDS Database Export in SMB (ntds.dit filename)

3000136 - CORELIGHT LATERAL NTDS Database Export in SMB (ESENT format artifacts)

3000137 - CORELIGHT LATERAL NTDS Database Export in SMB (zip with export filenames)

New EXPLOIT coverage

    
     

3000044 - CORELIGHT EXPLOIT ServiceNow ACL bypass in Reporting functionality attempt (CVE-2022-43684)

3000045 - CORELIGHT EXPLOIT Internet Connection Sharing (ICS) Remote Code Execution Attempt (CVE-2023-38148)

3000046 - CORELIGHT EXPLOIT WS_FTP Server Remote Code Execution Attempt - POST method (CVE-2023-40044)

3000047 - CORELIGHT EXPLOIT WS_FTP Server Remote Code Execution Attempt - GET method (CVE-2023-40044)

3000048 - CORELIGHT EXPLOIT Citrix-Netscaler CVE M1 (CVE-2023-3519)

3000049 - CORELIGHT EXPLOIT Citrix-Netscaler CVE M2 (CVE-2023-3519)

3000050 - CORELIGHT EXPLOIT Citrix-Netscaler CVE M3 (CVE-2023-3519)

3000051 - CORELIGHT EXPLOIT Citrix-Netscaler CVE M4 (CVE-2023-3519)

3000052 - CORELIGHT EXPLOIT Citrix-Netscaler CVE M5 (CVE-2023-3519)

3000053 - CORELIGHT EXPLOIT Curl exploit attempt in SOCKS5 - no alert just set flowbit (CVE-2023-38545)

3000054 - CORELIGHT EXPLOIT Curl exploit attempt in SOCKS5 (CVE-2023-38545)

3000055 - CORELIGHT EXPLOIT Cisco IOS XE implant connection attempt via logoutconfirm uri (CVE-2023-20198/CVE-2023-20273)

3000056 - CORELIGHT EXPLOIT Cisco IOS XE implant connection attempt via Authorization header (CVE-2023-20198/CVE-2023-20273)

3000057 - CORELIGHT EXPLOIT Cisco IOS XE implant connection attempt via exec command within POST body (CVE-2023-20198/CVE-2023-20273)

3000059 - CORELIGHT EXPLOIT Cisco IOS XE implant DETECTED - exec command was successful (CVE-2023-20198/CVE-2023-20273)

3000063 - CORELIGHT EXPLOIT ConnectWise ScreenConnect auth bypass attempt (CVE-2024-1709)

3000064 - CORELIGHT EXPLOIT ConnectWise ScreenConnect auth bypass SUCCESSFUL (CVE-2024-1709)

3000065 - CORELIGHT EXPLOIT Fortra FileCatalyst Workflow RCE attempt URL pattern 1 (CVE-2024-25153)

3000066 - CORELIGHT EXPLOIT Fortra FileCatalyst Workflow RCE attempt URL pattern 2 (CVE-2024-25153)

3000067 - CORELIGHT EXPLOIT Fortra FileCatalyst Workflow RCE attempt URL pattern 3 (CVE-2024-25153)

3000068 - CORELIGHT EXPLOIT Fortra FileCatalyst Workflow RCE attempt URL pattern 4 (CVE-2024-25153)

3000069 - CORELIGHT EXPLOIT FortiGate SSL VPN RCE exploit attempt (CVE-2024-21762)

3000073 - CORELIGHT EXPLOIT ColdFusion exploit attempt at retrieving a uuid - stage 1 of the attack (CVE-2024-20767)

3000074 - CORELIGHT EXPLOIT ColdFusion exploit attempt at file read - stage 2 of the attack (CVE-2024-20767)

3000080 - CORELIGHT EXPLOIT Hytec HWL-2511-SS Remote Command Injection Attempt (CVE-2022-36553)

3000082 - CORELIGHT EXPLOIT Apache OFBiz Deserialization Remote Code Execution Attempt (CVE-2021-26295)

3000119 - CORELIGHT EXPLOIT Possible QEMU Tunnel

3000133 - CORELIGHT EXPLOIT Axis Camera RCE Attempt (CVE-2018-10660)

3000138 - CORELIGHT EXPLOIT D-Link NAS Command Injection Attempt (CVE-2024-3273)

3000139 - CORELIGHT EXPLOIT D-Link NAS Possibly Successful Command Injection Attempt (CVE-2024-3273)

3000282 - CORELIGHT EXPLOIT Progress MOVEit Transfer authentication bypass - First stage of attack - HTTP POST of a SSH public key (CVE-2024-5806)

3000283 - CORELIGHT EXPLOIT Progress MOVEit Transfer authentication bypass - Second stage of attack - SSH connection (CVE-2024-5806)

New MALWARE coverage

    
     

3000070 - CORELIGHT MALWARE AsyncRAT Style TLS Certificate

3000071 - CORELIGHT MALWARE AsyncRAT Variant Style TLS Certificate

3000072 - CORELIGHT MALWARE QuasarRAT TLS Certificate

3000075 - CORELIGHT MALWARE STRRAT C2 Request

3000076 - CORELIGHT MALWARE STRRAT C2 Response

3000077 - CORELIGHT MALWARE STRRAT C2 Infected Computer License Check

3000078 - CORELIGHT MALWARE STRRAT C2 External IP Check Via ip-api.com

3000079 - CORELIGHT MALWARE STRRAT JAR File Inbound

3000081 - CORELIGHT MALWARE xmrigCC Donation Mining Pool Domain Lookup

3000118 - CORELIGHT MALWARE Kryptina Ransomware Encryptor Download Attempt

3000132 - CORELIGHT MALWARE dnscat2 Static Tagged DNS Tunnel

3000134 - CORELIGHT MALWARE Known Malicious User-Agent Inbound (Volt Typhoon)

3000140 - CORELIGHT MALWARE Amadey Malware Check-In via HTTP M1

3000141 - CORELIGHT MALWARE Amadey Malware Check-In via HTTP M2

3000142 - CORELIGHT MALWARE Amadey Style Module Download (cred64.dll)

3000143 - CORELIGHT MALWARE Amadey Style Module Download (clip64.dll)

3000144 - CORELIGHT MALWARE Amadey Malware Check-In via SOAP

3000145 - CORELIGHT MALWARE Amadey Malware Check-In Response via SOAP

3000146 - CORELIGHT MALWARE Covenant C2 TLS Certificate Artifacts

3000284 - CORELIGHT MALWARE Mythic C2 POST content (M1)

3000285 - CORELIGHT MALWARE Mythic C2 POST content (M2)

3000286 - CORELIGHT MALWARE Mythic C2 Websocket content (M3)

3000287 - CORELIGHT MALWARE Mythic C2 Binary (M4 noalert)

3000288 - CORELIGHT MALWARE Mythic C2 Binary (M4)

Recent Posts