Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort Rule 1:2044746 ET Trojan SOMNIRECORD

    Scheduled Pinned Locked Moved IDS/IPS
    14 Posts 6 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      joshs922 @phodge
      last edited by

      @phodge Just sharing this breaking information on this that I found. Looks like some rule changes are being pushed through tonight.

      P 1 Reply Last reply Reply Quote 3
      • P
        phodge @joshs922
        last edited by

        @joshs922 Good to know. Had a few more entries triggered by queries to 1.1.1.2 and 8.8.8.8. Will make sure the rules are updated tomorrow.

        J 1 Reply Last reply Reply Quote 0
        • J
          jimmychoosshoes @phodge
          last edited by jimmychoosshoes

          I traced one of our guests who were triggering this alert. They have a macbook air, currently it is believed that only windows variants exists so this is a false positive for us.

          https://www.elastic.co/security-labs/not-sleeping-anymore-somnirecords-wakeup-call

          https://siliconangle.com/2023/03/20/asian-attack-group-deploys-new-forms-malware-target-companies/

          obviously the maintainer has now posted that a fix for the "ET MALWARE SOMNIRECORD Backdoor DATA" trigger is incoming. We never saw probe or cmd alerts.

          D J 2 Replies Last reply Reply Quote 0
          • D
            DBMandrake @jimmychoosshoes
            last edited by DBMandrake

            @jimmychoosshoes Seeing lots of false positives for this rule here too. From a variety of different devices - Macbook Air's iPad's etc. Since there are only Windows variants of the malware and it was coming from so many non windows devices (over 30 devices on a network of 800 or so) I figured it was a false positive, especially after looking at the rule definition which looks overly broad to me.

            J J 2 Replies Last reply Reply Quote 0
            • J
              jimmychoosshoes @DBMandrake
              last edited by

              @dbmandrake We have not had any alerts today so all appears to be good.

              D 1 Reply Last reply Reply Quote 0
              • J
                joshs922 @jimmychoosshoes
                last edited by

                @jimmychoosshoes said in Snort Rule 1:2044746 ET Trojan SOMNIRECORD:

                I traced one of our guests who were triggering this alert. They have a macbook air,

                Yep. That's what was triggering the alerts here. The wife's MacBook Air.

                NogBadTheBadN 1 Reply Last reply Reply Quote 0
                • NogBadTheBadN
                  NogBadTheBad @joshs922
                  last edited by

                  @joshs922 said in Snort Rule 1:2044746 ET Trojan SOMNIRECORD:

                  traced one of our guests who were triggering this alert. They have a macbook air,

                  My Panasonic TV did it a few times yesterday.

                  Andy

                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                  1 Reply Last reply Reply Quote 1
                  • D
                    DBMandrake @jimmychoosshoes
                    last edited by

                    @jimmychoosshoes Seems OK now here as well.

                    J 1 Reply Last reply Reply Quote 0
                    • J
                      joshs922 @DBMandrake
                      last edited by

                      @dbmandrake @jimmychoosshoes @phodge

                      New one appeared today - Snort blocked a DNS request from pihole with rule number 2044844, "ET TROJAN SocGholish Domain in DNS Lookup (unit4 .majesticpg .com)"

                      Could this be another false positive? Seems fairly specific like a host was trying to phone home. Anyone else seeing anything like this?

                      1 Reply Last reply Reply Quote 0
                      • J
                        joshs922 @DBMandrake
                        last edited by

                        @dbmandrake @jimmychoosshoes @phodge

                        049f1f8c-728f-452f-a423-d415de931fd0-image.png

                        Found the actual contact attempt in the pihole logs .. the wife's Macbook Air. Hmm, time to exorcise that laptop.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.