시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
24,1112017/02/01 2023774  ET CURRENT_EVENTS Successful Tangerine Bank Phish M2 Jan 30 2017;  
24,1102017/02/01 2023773  ET CURRENT_EVENTS Successful Tangerine Bank Phish M1 Jan 30 2017;  
24,1092017/02/01 2023770  ET CURRENT_EVENTS Successful RBC Royal Bank Phish Jan 30 2017;  
24,1082017/01/29 2023769  ET TROJAN Possible Unknown Trojan Checkin Jan 26 2017;  
24,1072017/01/29 2023768  ET CURRENT_EVENTS Possible Broken/Filtered RIG EK Payload Download;  
24,1062017/01/27 2023765  ET TROJAN Unknown Trojan Checkin Jan 24 2017;  
24,1052017/01/27 2023767  ET TROJAN Sage Ransomware Checkin; [1
24,1042017/01/27 2023766  ET TROJAN Sage Ransomware Checkin Primer; [1
24,1032017/01/27 2023764  ET TROJAN Unknown Trojan Checkin Jan 24 2017;  
24,1022017/01/26 2023760  ET CURRENT_EVENTS Successful Paypal Phish Jan 23 2017;  
24,1012017/01/26 2023758  ET CURRENT_EVENTS Successful Apple iCloud Phish Jan 23 2017;  
24,1002017/01/26 2023762  ET TROJAN APT28 DealersChoice DNS Lookup (zpfgr .com); [1
24,0992017/01/26 2023756  ET WEB_CLIENT Possible Chrome WebEx Extension RCE Attempt; [1
24,0982017/01/26 2023761  ET TROJAN APT28 DealersChoice DNS Lookup (gtranm .com); [1
24,0972017/01/26 2023754  ET CURRENT_EVENTS Malicious JS.Nemucod to PS Dropping PE Nov 14 M2;  
24,0962017/01/26 2023759  ET CURRENT_EVENTS Possible Successful Generic Paypal Phish Jan 23 2016;  
24,0952017/01/26 2023757  ET CURRENT_EVENTS Fake AV Phone Scam Landing Jan 24;  
24,0942017/01/26 2023755  ET CURRENT_EVENTS Possible Microsoft RDP Client for Mac RCE; [1
24,0932017/01/26 2023763  ET TROJAN OSX Backdoor Quimitchin DNS Lookup; [1
24,0922017/01/25 2023753  ET SCAN MS Terminal Server taffic on Non-standard Port;  
24,0912017/01/21 2023750  ET MALWARE Windows executable sent when remote host claims to send an image 3;  
24,0902017/01/21 2023749  ET INFO Lock Emoji In Title - Possible Social Engineering Attempt;  
24,0892017/01/21 2023748  ET CURRENT_EVENTS Evil Redirector Leading to EK EITest Inject Oct 17 2016 M4;  
24,0882017/01/21 2023752  ET CURRENT_EVENTS Tech Support Phone Scam Landing M2 Jan 20 2017;  
24,0872017/01/21 2023751  ET CURRENT_EVENTS Tech Support Phone Scam Landing M1 Jan 20 2017;  
24,0862017/01/20 2023747  ET TROJAN Evil JS Ransomware; [1
24,0852017/01/20 2023746  ET TROJAN User-Agent (Xmaker); [1
24,0842017/01/19 2023745  ET CURRENT_EVENTS EITest SocEng Inject Jan 15 2017 EXE Download;  
24,0832017/01/19 2023744  ET CURRENT_EVENTS EITest SocEng Inject Jan 15 2017 M2;  
24,0822017/01/19 2023743  ET CURRENT_EVENTS EITest SocEng Inject Jan 15 2017 M1;  
24,0812017/01/19 2023742  ET CURRENT_EVENTS EITest SocEng Inject Jan 15 2017 M2;  
24,0802017/01/15 2023741  ET TROJAN Pony DLL Download M2;  
24,0792017/01/15 2023740  ET TROJAN Possible Pony Payload DL;  
24,0782017/01/14 2023739  ET TROJAN Maldoc Second Stage VBS Downloader with URL Padding;  
24,0772017/01/13 2023729  ET TROJAN DeepEnd Research Ransomware PadCrypt .onion Proxy Domain; [1
24,0762017/01/13 2023721  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gozi MITM); [1
24,0752017/01/13 2023736  ET TROJAN DeepEnd Research Ransomware CryptoWall .onion Proxy Domain; [1
24,0742017/01/13 2023728  ET TROJAN Spora Ransomware DNS Query; [1
24,0732017/01/13 2023731  ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1
24,0722017/01/13 2023726  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Chthonic CnC); [1
24,0712017/01/13 2023717  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gozi MITM); [1
24,0702017/01/13 2023720  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gozi MITM); [1
24,0692017/01/13 2023733  ET TROJAN DeepEnd Research Ransomware PadCrypt .onion Proxy Domain; [1
24,0682017/01/13 2023734  ET TROJAN DeepEnd Research Ransomware PadCrypt .onion Proxy Domain; [1
24,0672017/01/13 2023735  ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1
24,0662017/01/13 2023722  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Quakbot CnC); [1
24,0652017/01/13 2023738  ET TROJAN Ransomware CrypMIC Payment Onion Domain;  
24,0642017/01/13 2023737  ET TROJAN Ransomware CrypMIC Payment Onion Domain;  
24,0632017/01/13 2023730  ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1
24,0622017/01/13 2023724  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gozi MITM); [1
< 61  62  63  64  65  66  67  68  69  70 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.