번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
22,761 | 2016/04/07 | 2022712 | ET EXPLOIT Dameware DMRC Buffer Overflow Attempt (CVE-2016-2345); [1] |
22,760 | 2016/04/07 | 2022707 | ET TROJAN LuminosityLink - Data Channel Client Request 2; |
22,759 | 2016/04/07 | 2022710 | ET TROJAN LuminosityLink - CnC; |
22,758 | 2016/04/07 | 2022711 | ET TROJAN TeslaCrypt/AlphaCrypt Variant .onion Payment Domain(xzjvzkgjxebzreap); |
22,757 | 2016/04/07 | 2022709 | ET TROJAN LuminosityLink - CnC Password Exfil; |
22,756 | 2016/04/07 | 2022706 | ET TROJAN ABUSE.CH Ransomware Domain Detected (TorrentLocker C2); [1] |
22,755 | 2016/04/07 | 2022703 | ET TROJAN ABUSE.CH Ransomware Domain Detected (TorrentLocker C2); [1] |
22,754 | 2016/04/07 | 2022705 | ET TROJAN ABUSE.CH Ransomware Domain Detected (TorrentLocker C2); [1] |
22,753 | 2016/04/07 | 2022708 | ET TROJAN LuminosityLink - Data Channel Server Response 2; |
22,752 | 2016/04/07 | 2022701 | ET EXPLOIT Quanta LTE Router RDE Exploit Attempt 2 (traceroute); [1] |
22,751 | 2016/04/07 | 2022702 | ET TROJAN ABUSE.CH Ransomware Domain Detected (TorrentLocker C2); [1] |
22,750 | 2016/04/07 | 2022698 | ET EXPLOIT Quanta LTE Router Information Disclosure Exploit Attempt; [1] |
22,749 | 2016/04/07 | 2022700 | ET EXPLOIT Quanta LTE Router RDE Exploit Attempt 1 (ping); [1] |
22,748 | 2016/04/07 | 2022704 | ET TROJAN ABUSE.CH Ransomware Domain Detected (TorrentLocker C2); [1] |
22,747 | 2016/04/07 | 2022699 | ET EXPLOIT Quanta LTE Router UDP Backdoor Activation Attempt; [1] |
22,746 | 2016/04/05 | 2200085 | SURICATA IPv6-in-IPv6 invalid protocol; |
22,745 | 2016/04/05 | 2221026 | SURICATA HTTP request server port doesn't match TCP port; |
22,744 | 2016/04/05 | 2200084 | SURICATA IPv6-in-IPv6 packet too short; |
22,743 | 2016/04/05 | 2200082 | SURICATA IPv4-in-IPv6 packet too short; |
22,742 | 2016/04/05 | 2022697 | ET CURRENT_EVENTS Fake AV Phone Scam Landing Apr 4; |
22,741 | 2016/04/05 | 2022484 | ET CURRENT_EVENTS RIG encrypted payload Feb 02 (1); |
22,740 | 2016/04/05 | 2022552 | ET TROJAN FrameworkPOS CnC Server Reporting IP Address To Agent; [1] |
22,739 | 2016/04/05 | 2022696 | ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain Apr 4; |
22,738 | 2016/04/05 | 2200083 | SURICATA IPv4-in-IPv6 invalid protocol; |
22,737 | 2016/04/05 | 2022578 | ET CURRENT_EVENTS Phishing Landing Obfuscation Mar 1; [1] |
22,736 | 2016/04/05 | 2021736 | ET CURRENT_EVENTS Possible Dyre SSL Cert Aug 31 2015; [1] |
22,735 | 2016/04/05 | 2021735 | ET CURRENT_EVENTS Possible Dyre SSL Cert Aug 31 2015; [1] |
22,734 | 2016/04/05 | 2021225 | ET DELETED Possible Upatre or Dyre SSL Cert June 9 2015; |
22,733 | 2016/04/05 | 2021383 | ET TROJAN Possible Zberp receiving config via image file (steganography) 2; [1] |
22,732 | 2016/04/05 | 2021249 | ET CURRENT_EVENTS Possible Evil Redirector Leading to EK June 11 2015; |
22,731 | 2016/04/05 | 2021382 | ET TROJAN Possible Zberp receiving config via image file (steganography); [1,2] |
22,730 | 2016/04/05 | 2019345 | ET CURRENT_EVENTS Possible CryptoLocker TorComponent DL; [1] |
22,729 | 2016/04/05 | 2021381 | ET TROJAN Zberp receiving config via image file - SET; [1,2] |
22,728 | 2016/04/05 | 2021059 | ET CURRENT_EVENTS Angler EK XTEA encrypted binary (23); |
22,727 | 2016/04/03 | 2022695 | ET CURRENT_EVENTS Fake AV Phone Scam Landing Apr 1; |
22,726 | 2016/04/03 | 2404424 | ET CNC Ransomware Tracker Reported CnC Server group 25; [1,2] |
22,725 | 2016/04/03 | 2022694 | ET MALWARE Win32/SmartTab PUP Install Activity 2; |
22,724 | 2016/04/01 | 2404422 | ET CNC Ransomware Tracker Reported CnC Server group 23; [1,2] |
22,723 | 2016/04/01 | 2404423 | ET CNC Ransomware Tracker Reported CnC Server group 24; [1,2] |
22,722 | 2016/04/01 | 2404421 | ET CNC Ransomware Tracker Reported CnC Server group 22; [1,2] |
22,721 | 2016/04/01 | 2022693 | ET EXPLOIT TrendMicro node.js (Remote Debugger); [1] |
22,720 | 2016/04/01 | 2022692 | ET TROJAN JS/Nemucod requesting EXE payload 2016-03-31; [1] |
22,719 | 2016/04/01 | 2022690 | ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain Mar 30 M1; |
22,718 | 2016/04/01 | 2022691 | ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain Mar 30 M2; |
22,717 | 2016/04/01 | 2022689 | ET TROJAN Win32/Backdoor.Dripion HTTP CnC Checkin; [1] |
22,716 | 2016/04/01 | 2022688 | ET TROJAN Win32/Backdoor.Dripion External IP Check; [1] |
22,715 | 2016/04/01 | 2022687 | ET POLICY External IP Address Lookup via dawhois.com; |
22,714 | 2016/04/01 | 2022684 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Zeus CnC); [1] |
22,713 | 2016/04/01 | 2022686 | ET CURRENT_EVENTS Likely Evil Macro EXE DL mar 28 2016; |
22,712 | 2016/04/01 | 2022685 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Quakbot CnC); [1] |
< 81 82 83 84 85 86 87 88 89 90 > |