시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
20,4612015/02/20 2020451  ET TROJAN Arid Viper APT DNS Lookup (plmedgroup.com); [1
20,4602015/02/20 2020449  ET TROJAN Arid Viper APT DNS Lookup (ineltdriver.com); [1
20,4592015/02/20 2020450  ET TROJAN Arid Viper APT DNS Lookup (mediahitech.info); [1
20,4582015/02/20 2020447  ET TROJAN Arid Viper APT DNS Lookup (flushupdate.com); [1
20,4572015/02/20 2020445  ET TROJAN Arid Viper APT DNS Lookup (mixedwork.com); [1
20,4562015/02/20 2020448  ET TROJAN Arid Viper APT DNS Lookup (flushupate.com); [1
20,4552015/02/20 2020453  ET TROJAN Arid Viper APT Advtravel Campaign DNS Lookup (fpupdate.info); [1
20,4542015/02/20 2020446  ET TROJAN Arid Viper APT DNS Lookup (ahmedfaiez.info); [1
20,4532015/02/20 2020441  ET TROJAN Arid Viper APT Possible User-Agent (SK); [1
20,4522015/02/20 2020444  ET TROJAN Arid Viper APT DNS Lookup (pstcmedia.com); [1
20,4512015/02/20 2020437  ET TROJAN Arid Viper APT Checking filename; [1
20,4502015/02/20 2020435  ET TROJAN Arid Viper APT Exfiltrating files; [1
20,4492015/02/20 2020443  ET TROJAN Arid Viper APT Possible User-Agent (Skypee); [1
20,4482015/02/20 2020442  ET TROJAN Arid Viper APT Possible User-Agent (Skype); [1
20,4472015/02/20 2020439  ET TROJAN Arid Viper APT Transmitting Serial; [1
20,4462015/02/20 2020440  ET TROJAN Arid Viper APT Transmitting Date; [1
20,4452015/02/20 2020438  ET TROJAN Arid Viper APT File information; [1
20,4442015/02/20 2020436  ET TROJAN Arid Viper APT Checkin 2; [1
20,4432015/02/20 2020434  ET TROJAN Arid Viper APT Checkin 1; [1
20,4422015/02/20 2020429  ET CURRENT_EVENTS Uknown EK Java Exploit;  
20,4412015/02/20 2020430  ET POLICY DNS Query to .onion proxy Domain (onion.city);  
20,4402015/02/20 2020432  ET TROJAN Likely Arid Viper APT Advtravel Campaign GET Keepalive; [1
20,4392015/02/20 2020433  ET TROJAN Likely Arid Viper APT Advtravel Campaign POST; [1
20,4382015/02/20 2020431  ET TROJAN Arid Viper APT Advtravel Campaign GET Request; [1
20,4372015/02/20 2020423  ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 1 M1;  
20,4362015/02/20 2020427  ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 2 M2;  
20,4352015/02/20 2020428  ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 3 M2;  
20,4342015/02/20 2020425  ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 3 M1;  
20,4332015/02/20 2020426  ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 1 M2;  
20,4322015/02/20 2020424  ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 2 M1;  
20,4312015/02/20 2020208  ET DELETED Possible Dalexis Serial Number in SSL Cert;  
20,4302015/02/18 2020456  ET TROJAN Carbanak APT CnC Beacon 2; [1
20,4292015/02/18 2020457  ET MALWARE W32/MultiPlug.Adware Adfraud Traffic; [1
20,4282015/02/18 2020455  ET TROJAN Carbanak APT CnC Beacon 1; [1
20,4272015/02/18 2020458  ET TROJAN Chanitor Variant .onion Proxy Domain;  
20,4262015/02/14 2520222  ET TOR Known Tor Exit Node Traffic group 112; [1
20,4252015/02/14 2020422  ET MALWARE Win32/Adware.MultiPlug.J Checkin;  
20,4242015/02/14 2404048  ET CNC Shadowserver Reported CnC Server group 49; [1,2
20,4232015/02/14 2020421  ET TROJAN Win32/Gulcrypt.B Downloading components;  
20,4222015/02/14 2020418  ET TROJAN Tinba Checkin 2;  
20,4212015/02/14 2020420  ET TROJAN Win32/Gulcrypt.B Downloading components - set;  
20,4202015/02/14 2020417  ET POLICY Middle Earth Illegal Marketplace Tor Hidden Service DNS Query;  
20,4192015/02/14 2020419  ET CURRENT_EVENTS Upatre Common URI Struct Feb 12 2015;  
20,4182015/02/14 2020412  ET TROJAN Predator Pain Keylogger FTP;  
20,4172015/02/14 2020415  ET POLICY I2P Seeds File Request; [1
20,4162015/02/14 2020416  ET POLICY I2P Seeds File Download; [1
20,4152015/02/14 2020411  ET TROJAN MSIL/Golroted.B Keylogger FTP;  
20,4142015/02/13 2020409  ET CURRENT_EVENTS Evil Redirector Leading to EK Feb 11 2015 Blog;  
20,4132015/02/13 2020410  ET TROJAN HawkEye Keylogger FTP;  
20,4122015/02/13 2020405  ET POLICY DNS Query to .onion proxy Domain (batmantor.com);  
< 131  132  133  134  135  136  137  138  139  140 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.