시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
16,2612015/01/20 2019207  ET TROJAN Linux/BillGates Checkin;  
16,2602015/01/20 2019206  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,2592015/01/20 2019205  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS C2); [1
16,2582015/01/20 2019204  ET TROJAN Backdoor.Win32.PcClient.bal CnC (OUTBOUND);  
16,2572015/01/20 2019203  ET TROJAN Backdoor.Win32.PcClient.bal CnC (OUTBOUND) 3;  
16,2562015/01/20 2019202  ET TROJAN Backdoor.Win32.PcClient.bal CnC (OUTBOUND) 2;  
16,2552015/01/20 2019201  ET TROJAN Backdoor.Win32/PcClient.AA Checkin;  
16,2542015/01/20 2019200  ET CURRENT_EVENTS Possible Dyre SSL Cert Sept 19 2014;  
16,2532015/01/20 2019199  ET TROJAN NewPosThings POST with Fake UA and Accept Header; [1
16,2522015/01/20 2019198  ET TROJAN NewPosThings Data Exfiltration; [1
16,2512015/01/20 2019197  ET TROJAN NewPosThings Checkin; [1
16,2502015/01/20 2019196  ET CURRENT_EVENTS Androm SSL Cert Sept 18 2014;  
16,2492015/01/20 2019195  ET CURRENT_EVENTS Nuclear EK Redirect Sept 18 2014;  
16,2482015/01/20 2019194  ET CURRENT_EVENTS Nuclear EK Redirect Sept 18 2014; [1
16,2472015/01/20 2019193  ET CURRENT_EVENTS RIG EK Landing Page Sept 17 2014;  
16,2462015/01/20 2019192  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,2452015/01/20 2019191  ET TROJAN Infostealer.Banprox Proxy.pac Download 3;  
16,2442015/01/20 2019190  ET TROJAN Infostealer.Banprox Proxy.pac Download 2;  
16,2432015/01/20 2019189  ET CURRENT_EVENTS Nuclear EK CVE-2013-2551 URI Struct Sept 17 2014;  
16,2422015/01/20 2019188  ET CURRENT_EVENTS Nuclear EK CVE-2013-2551 Sept 17 2014;  
16,2412015/01/20 2019187  ET TROJAN Kuluoz/Asprox CnC Response; [1,2
16,2402015/01/20 2019186  ET CURRENT_EVENTS Possible Dyre SSL Cert Sept 16 2014;  
16,2392015/01/20 2019185  ET CURRENT_EVENTS Nuclear EK Gate Sep 16 2014;  
16,2382015/01/20 2019184  ET CURRENT_EVENTS Fiesta EK Silverlight Based Redirect;  
16,2372015/01/20 2019183  ET CURRENT_EVENTS Fiesta EK Gate;  
16,2362015/01/20 2019182  ET WEB_SERVER HTTP POST Generic eval of base64_decode;  
16,2352015/01/20 2019181  ET CURRENT_EVENTS Possible Android CVE-2014-6041; [1
16,2342015/01/20 2019180  ET CURRENT_EVENTS Malvertising Leading to EK Aug 19 2014 M4;  
16,2332015/01/20 2019179  ET TROJAN MSIL/Spy.RapidStealer.B Checkin; [1
16,2322015/01/20 2019178  ET CURRENT_EVENTS Possible Dyre SSL Cert Sept 16 2014;  
16,2312015/01/20 2019177  ET TROJAN Linux/AES.DDoS Sending Real/Fake CPU&BW Info;  
16,2302015/01/20 2019176  ET CURRENT_EVENTS Possible Astrum EK URI Struct;  
16,2292015/01/20 2019175  ET MOBILE_MALWARE iOS/AppBuyer Checkin 2; [1
16,2282015/01/20 2019174  ET MOBILE_MALWARE iOS/AppBuyer Checkin 1; [1
16,2272015/01/20 2019173  ET CURRENT_EVENTS Possible Dyre SSL Cert Sept 15 2014;  
16,2262015/01/20 2019172  ET TROJAN Linux.DDoS Checkin;  
16,2252015/01/20 2019171  ET TROJAN DoS.Linux/Elknot.E Checkin;  
16,2242015/01/20 2019169  ET TROJAN Tinba Server Response;  
16,2232015/01/20 2019168  ET TROJAN Tinba Checkin;  
16,2222015/01/20 2019167  ET CURRENT_EVENTS Nuclear EK Silverlight URI Struct;  
16,2212015/01/20 2019166  ET TROJAN Stobox Connectivity Check;  
16,2202015/01/20 2019165  ET TROJAN Possible Banload Downloading Executable;  
16,2192015/01/20 2019164  ET TROJAN JackPOS XOR Encoded HTTP Client Body (key AA); [1
16,2182015/01/20 2019163  ET TROJAN W32/Alina.POS-Trojan Checkin; [1
16,2172015/01/20 2019162  ET TROJAN Win.Trojan.Chewbacca connectivity check; [1
16,2162015/01/20 2019161  ET TROJAN DecebalPOS User-Agent; [1
16,2152015/01/20 2019160  ET TROJAN DecebalPOS Checkin; [1
16,2142015/01/20 2019159  ET TROJAN TSPY_POCARDL.U Possible FTP Login; [1
16,2132015/01/20 2019158  ET TROJAN Possible Malicious Invoice EXE;  
16,2122015/01/20 2019157  ET WEB_SPECIFIC_APPS Webmin Directory Traversal; [1
< 211  212  213  214  215  216  217  218  219  220 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.