시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
20,2612015/01/24 2020246  ET TROJAN Scieron DNS Lookup (blackblog.chatnook.com); [1
20,2602015/01/24 2020251  ET TROJAN Scieron DNS Lookup (dynamic.ddns.mobi); [1
20,2592015/01/24 2020258  ET TROJAN Scieron DNS Lookup (logoff.25u.com); [1
20,2582015/01/24 2020237  ET TROJAN Inception APT malware; [1
20,2572015/01/24 2020247  ET TROJAN Scieron DNS Lookup (bulldog.toh.info); [1
20,2562015/01/24 2020248  ET TROJAN Scieron DNS Lookup (cew58e.xxxy.info); [1
20,2552015/01/24 2020252  ET TROJAN Scieron DNS Lookup (expert.4irc.com); [1
20,2542015/01/24 2020253  ET TROJAN Scieron DNS Lookup (football.mrbasic.com); [1
20,2532015/01/24 2020254  ET TROJAN Scieron DNS Lookup (gjjb.flnet.org); [1
20,2522015/01/24 2020250  ET TROJAN Scieron DNS Lookup (demon.4irc.com); [1
20,2512015/01/24 2020249  ET TROJAN Scieron DNS Lookup (coastnews.darktech.org); [1
20,2502015/01/24 2020244  ET TROJAN Scieron DNS Lookup (apple.dynamic-dns.net); [1
20,2492015/01/24 2020245  ET TROJAN Scieron DNS Lookup (autocar.ServeUser.com); [1
20,2482015/01/24 2020243  ET TROJAN Scieron Possible SSL Cert; [1
20,2472015/01/24 2020240  ET MALWARE PUP.Win32.BoBrowser User-Agent (BoBrowser); [1
20,2462015/01/24 2020242  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
20,2452015/01/24 2020238  ET MALWARE PUP.Win32.BoBrowser User-Agent (LogEvents); [1
20,2442015/01/24 2020241  ET TROJAN Backdoor.TurlaCarbon.A C2 HTTP Request; [1
20,2432015/01/24 2020239  ET MALWARE PUP.Win32.BoBrowser User-Agent (VersionDwl); [1
20,2422015/01/22 2523362  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 682; [1
20,2412015/01/22 2523364  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 683; [1
20,2402015/01/22 2523360  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 681; [1
20,2392015/01/22 2523358  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 680; [1
20,2382015/01/22 2500140  ET COMPROMISED Known Compromised or Hostile Host Traffic group 71; [1
20,2372015/01/22 2020233  ET TROJAN CryptoWall CryptoWall 3.0 Check-in;  
20,2362015/01/22 2020235  ET TROJAN Mazilla Suspicious User-Agent Jan 15 2015; [1
20,2352015/01/22 2020234  ET CURRENT_EVENTS Possible Angler EK Flash Exploit URI Structure Jan 21 2015;  
20,2342015/01/22 2020231  ET TROJAN DNS Query for Suspicious proxy4-4-4.i2p Domain - Possible CryptoWall Activity; [1
20,2332015/01/22 2020236  ET CURRENT_EVENTS Nuclear EK Landing Jan 21 2014;  
20,2322015/01/22 2020230  ET TROJAN DNS Query for Suspicious proxy3-3-3.i2p Domain - Possible CryptoWall Activity; [1
20,2312015/01/22 2020232  ET TROJAN DNS Query for Suspicious proxy5-5-5.i2p Domain - Possible CryptoWall Activity; [1
20,2302015/01/22 2020226  ET TROJAN Critroni Variant .onion Proxy Domain;  
20,2292015/01/22 2020225  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (9);  
20,2282015/01/22 2020229  ET TROJAN DNS Query for Suspicious proxy2-2-2.i2p Domain - Possible CryptoWall Activity; [1
20,2272015/01/22 2020228  ET TROJAN DNS Query for Suspicious proxy1-1-1.i2p Domain - Possible CryptoWall Activity; [1
20,2262015/01/22 2020227  ET DELETED Angler EK XTEA encrypted binary (10);  
20,2252015/01/22 2020223  ET TROJAN Known Sinkhole Response abuse.ch;  
20,2242015/01/22 2020224  ET CURRENT_EVENTS Possible Successful Phishing Attempt Jan 20 2015;  
20,2232015/01/22 2020222  ET TROJAN Win32/Nitol.A Checkin 2;  
20,2222015/01/21 2523366  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 684; [1
20,2212015/01/21 2520220  ET TOR Known Tor Exit Node Traffic group 111; [1
20,2202015/01/21 2020215  ET TROJAN Backdoor.Win32.PcClient.bal CnC (OUTBOUND) 5;  
20,2192015/01/21 2020217  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
20,2182015/01/21 2020219  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
20,2172015/01/21 2020220  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
20,2162015/01/21 2020221  ET WEB_SPECIFIC_APPS WP Generic revslider Arbitrary File Download; [1
20,2152015/01/21 2520218  ET TOR Known Tor Exit Node Traffic group 110; [1
20,2142015/01/21 2020216  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (URLzone CnC); [1
20,2132015/01/21 2020218  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
20,2122015/01/21 2523368  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 685; [1
< 131  132  133  134  135  136  137  138  139  140 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.