시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
20,7112015/03/21 2020715  ET CURRENT_EVENTS Evil Redirector Leading to EK Mar 19 2015;  
20,7102015/03/21 2020716  ET POLICY Possible External IP Lookup ipinfo.io;  
20,7092015/03/21 2020714  ET TROJAN HOMEUNIX/9002 CnC Beacon;  
20,7082015/03/21 2020712  ET MALWARE AdWare.Win32.BetterSurf.b SSL Cert;  
20,7072015/03/21 2020710  ET CURRENT_EVENTS Fake Windows Security Warning - Alert;  
20,7062015/03/21 2020713  ET TROJAN 9002 RAT C&C DNS request;  
20,7052015/03/21 2020711  ET CURRENT_EVENTS Fake Windows Security Warning - png;  
20,7042015/03/20 2020708  ET TROJAN Win32/Agent.WMN CnC Beacon;  
20,7032015/03/20 2020706  ET TROJAN FakeAV Variant CnC Beacon;  
20,7022015/03/20 2020702  ET DOS Bittorrent User-Agent inbound - possible DDOS; [1
20,7012015/03/20 2020705  ET TROJAN Generic - Mozilla 4.0 EXE Request;  
20,7002015/03/20 2020703  ET POLICY DNS Query to .onion proxy Domain (tordomain.org);  
20,6992015/03/20 2020707  ET TROJAN VaultCrypt Uploading Files; [1
20,6982015/03/20 2020704  ET POLICY DNS Query to .onion proxy Domain (welcome2tor.org);  
20,6972015/03/18 2020701  ET MALWARE Potentially Unwanted Application AirInstaller CnC Beacon;  
20,6962015/03/18 2020700  ET TROJAN MWI Maldoc Exploit Kit Stats Callout;  
20,6952015/03/18 2020699  ET WEB_CLIENT Microsoft Office RTF Stack Buffer Overflow;  
20,6942015/03/18 2020698  ET CURRENT_EVENTS Evil Redirector Leading to EK March 16 2015;  
20,6932015/03/18 2020697  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
20,6922015/03/15 2020696  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 61; [1
20,6912015/03/15 2020694  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 59; [1
20,6902015/03/15 2020693  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 58; [1
20,6892015/03/15 2020695  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 60; [1
20,6882015/03/15 2020692  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 57; [1
20,6872015/03/15 2020688  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
20,6862015/03/15 2020691  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 56; [1
20,6852015/03/15 2020690  ET TROJAN Vicepass CnC Beacon;  
20,6842015/03/15 2020689  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Ransomware CnC); [1
20,6832015/03/14 2020687  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
20,6822015/03/14 2020686  ET POLICY DNS Query to .onion proxy Domain (tor4free.org); [1
20,6812015/03/14 2020685  ET TROJAN Cryptolocker .onion Proxy Domain (4elcqmis624seeo7); [1
20,6802015/03/14 2020684  ET TROJAN DNS Query to .onion proxy Domain (mmc65z4xsgbcbazl);  
20,6792015/03/13 2020681  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6782015/03/13 2020682  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6772015/03/13 2020683  ET TROJAN Gamarue/Andromeda Downloading Payload;  
20,6762015/03/13 2020680  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6752015/03/13 2020679  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6742015/03/13 2020678  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6732015/03/13 2020675  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6722015/03/13 2020674  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6712015/03/13 2020677  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6702015/03/13 2020672  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6692015/03/13 2020673  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6682015/03/13 2020670  ET TROJAN Cryptolocker .onion Proxy Domain (juf5pjk4sl7uojh4); [1
20,6672015/03/13 2020676  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6662015/03/13 2020671  ET TROJAN Win32/Rofin.A CnC traffic (OUTBOUND);  
20,6652015/03/12 2020668  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6642015/03/12 2020666  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6632015/03/12 2020669  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6622015/03/12 2020665  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
< 121  122  123  124  125  126  127  128  129  130 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.