시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
16,5112015/01/20 2019459  ET TROJAN Win32/Zemot Requesting PE;  
16,5102015/01/20 2019458  ET TROJAN Win32/Zemot URI Struct;  
16,5092015/01/20 2019457  ET TROJAN Vawtrak/NeverQuest Posting Data;  
16,5082015/01/20 2019456  ET CURRENT_EVENTS FlashPack Payload URI Struct Oct 16 2014;  
16,5072015/01/20 2019455  ET TROJAN FrameworkPOS Covert DNS CnC Beacon 2; [1
16,5062015/01/20 2019454  ET TROJAN FrameworkPOS Covert DNS CnC Beacon 1; [1
16,5052015/01/20 2019453  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 32; [1
16,5042015/01/20 2019452  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 31; [1
16,5032015/01/20 2019451  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 30; [1
16,5022015/01/20 2019450  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 29; [1
16,5012015/01/20 2019449  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 28; [1
16,5002015/01/20 2019448  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 27; [1
16,4992015/01/20 2019447  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 26; [1
16,4982015/01/20 2019446  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 25; [1
16,4972015/01/20 2019445  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 24; [1
16,4962015/01/20 2019444  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 23; [1
16,4952015/01/20 2019443  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 22; [1
16,4942015/01/20 2019442  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 21; [1
16,4932015/01/20 2019441  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 20; [1
16,4922015/01/20 2019440  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 19; [1
16,4912015/01/20 2019439  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 18; [1
16,4902015/01/20 2019438  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 17; [1
16,4892015/01/20 2019437  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 16; [1
16,4882015/01/20 2019436  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 15; [1
16,4872015/01/20 2019435  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 14; [1
16,4862015/01/20 2019434  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 13; [1
16,4852015/01/20 2019433  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 12; [1
16,4842015/01/20 2019432  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 11; [1
16,4832015/01/20 2019431  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 10; [1
16,4822015/01/20 2019430  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 9; [1
16,4812015/01/20 2019429  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 8; [1
16,4802015/01/20 2019428  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 7; [1
16,4792015/01/20 2019427  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 6; [1
16,4782015/01/20 2019426  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 5; [1
16,4772015/01/20 2019425  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 4; [1
16,4762015/01/20 2019424  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 3; [1
16,4752015/01/20 2019423  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 2; [1
16,4742015/01/20 2019422  ET EXPLOIT Possible CVE-2014-3704 Drupal SQLi attempt URLENCODE 1; [1
16,4732015/01/20 2019421  ET WEB_CLIENT Possible CVE-2014-4113 Exploit Download with Hurricane Panda IOC; [1
16,4722015/01/20 2019420  ET WEB_CLIENT Possible CVE-2014-4113 Exploit Download; [1
16,4712015/01/20 2019419  ET CURRENT_EVENTS Possible Dyre SSL Cert Oct 15 2014;  
16,4702015/01/20 2019418  ET CURRENT_EVENTS SSL excessive fatal alerts (possible POODLE attack against server); [1,2,3,4
16,4692015/01/20 2019417  ET CURRENT_EVENTS excessive fatal alerts (possible POODLE attack against client); [1,2,3,4
16,4682015/01/20 2019416  ET POLICY SSLv3 outbound connection from client vulnerable to POODLE attack; [1,2,3,4
16,4672015/01/20 2019415  ET POLICY SSLv3 inbound connection to server vulnerable to POODLE attack; [1,2,3,4
16,4662015/01/20 2019414  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,4652015/01/20 2019413  ET CURRENT_EVENTS Possible Dyre SSL Cert Oct 15 2014;  
16,4642015/01/20 2019412  ET TROJAN W32/BlackEnergy Dirconf CnC Beacon; [1
16,4632015/01/20 2019411  ET CURRENT_EVENTS SUSPICIOUS SMTP Attachment Inbound PPT attachment with Embedded OLE Object M6;  
16,4622015/01/20 2019410  ET CURRENT_EVENTS SUSPICIOUS SMTP Attachment Inbound PPT attachment with Embedded OLE Object M5;  
< 211  212  213  214  215  216  217  218  219  220 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.