시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
20,8612015/04/10 2020867  ET EXPLOIT FritzBox RCE POST Request; [1
20,8602015/04/10 2020865  ET CURRENT_EVENTS Nuclear EK Landing Apr 08 2015;  
20,8592015/04/10 2020863  ET EXPLOIT ASUS RT N56U Router DNS Change GET Request 2; [1
20,8582015/04/10 2020866  ET CURRENT_EVENTS Possible Dridex downloader SSL Certificate srv1.mainsftdomain.com;  
20,8572015/04/10 2020861  ET EXPLOIT Motorola SBG900 Router DNS Change GET Request; [1
20,8562015/04/10 2020862  ET EXPLOIT ASUS RT N56U Router DNS Change GET Request 1; [1
20,8552015/04/09 2020858  ET EXPLOIT Linksys WRT54GL Router DNS Change POST Request; [1
20,8542015/04/09 2020857  ET EXPLOIT Belkin Wireless G Router DNS Change POST Request; [1
20,8532015/04/09 2020859  ET EXPLOIT Netgear WNDR Router DNS Change POST Request; [1
20,8522015/04/09 2020860  ET TROJAN Malicious Office Doc CnC Beacon;  
20,8512015/04/09 2020856  ET EXPLOIT TP-LINK TL-WR340G Router DNS Change GET Request; [1
20,8502015/04/09 2020855  ET TROJAN CryptoWall Check-in M2;  
20,8492015/04/09 2020854  ET CURRENT_EVENTS DRIVEBY Router DNS Changer Apr 07 2015;  
20,8482015/04/09 2020853  ET SCAN H.323 Scanning device; [1
20,8472015/04/09 2020851  ET TROJAN TinyLoader.B Checkin no architecture;  
20,8462015/04/09 2020852  ET TROJAN TinyLoader.B Sending Processes;  
20,8452015/04/09 2020850  ET TROJAN TinyLoader.B Checkin x64;  
20,8442015/04/09 2020849  ET TROJAN TinyLoader.B Checkin x86;  
20,8432015/04/08 2020848  ET CURRENT_EVENTS Chrome Cookie Data Theft April 06 2015; [1
20,8422015/04/08 2020847  ET CURRENT_EVENTS Chrome Form Data Theft April 06 2015; [1
20,8412015/04/08 2020845  ET TROJAN Possible Win32/SillyFDC WordPress Traffic;  
20,8402015/04/08 2020846  ET CURRENT_EVENTS Possible Upatre DNS Query (jamco.com.pk);  
20,8392015/04/08 2020844  ET POLICY DNS Query to .onion proxy Domain (7hwr34n18.com);  
20,8382015/04/08 2020843  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
20,8372015/04/05 2020839  ET POLICY DNS Query to .onion proxy Domain (63ghdye17.com); [1
20,8362015/04/05 2020837  ET CURRENT_EVENTS Malicious Doc Download EXE Primer (flowbits set); [1
20,8352015/04/05 2020841  ET CURRENT_EVENTS Nuclear EK Landing Apr 03 2015;  
20,8342015/04/05 2020842  ET CURRENT_EVENTS Nuclear EK Landing Apr 03 2015;  
20,8332015/04/05 2020840  ET CURRENT_EVENTS Malicious Redirect Leading to EK Apr 03 2015;  
20,8322015/04/05 2020838  ET CURRENT_EVENTS Malicious Doc Downloading EXE; [1
20,8312015/04/04 2020833  ET TROJAN Mikey Variant HTTP CnC Beacon 1;  
20,8302015/04/04 2020835  ET TROJAN Mikey Variant HTTP CnC Beacon 3;  
20,8292015/04/04 2020836  ET TROJAN IRC Bot dropped by Mikey Variant CnC Beacon;  
20,8282015/04/04 2020834  ET TROJAN Mikey Variant HTTP CnC Beacon 2;  
20,8272015/04/04 2020832  ET CURRENT_EVENTS Evil Redirector Leading to EK Apr 2 2015;  
20,8262015/04/04 2020831  ET POLICY External IP Lookup - ip-whois;  
20,8252015/04/04 2020830  ET POLICY External IP Lookup - Bravica;  
20,8242015/04/04 2020827  ET TROJAN Win32/LockScreen.BW Payment Info;  
20,8232015/04/04 2020828  ET TROJAN Win32/LockScreen.BW Payment Info 2;  
20,8222015/04/04 2020829  ET TROJAN Win32/LockScreen.BW Checkin;  
20,8212015/04/02 2020826  ET CURRENT_EVENTS Potential Dridex.Maldoc Minimal Executable Request; [1
20,8202015/04/02 2020821  ET TROJAN Win32/Hyteod CnC Beacon;  
20,8192015/04/02 2020818  ET TROJAN Volatile Cedar DNS Lookup (dotntexplorere.info); [1
20,8182015/04/02 2020824  ET CURRENT_EVENTS VBScript Driveby Related TDS MAR 31 2015;  
20,8172015/04/02 2020825  ET TROJAN Dridex POST Retrieving Second Stage M2;  
20,8162015/04/02 2020823  ET CURRENT_EVENTS VBScript Driveby MAR 31 2015;  
20,8152015/04/02 2020822  ET TROJAN HTTP POST to WP Theme Directory Without Referer;  
20,8142015/04/02 2020819  ET TROJAN Volatile Cedar DNS Lookup (xploreredotnet.info); [1
20,8132015/04/02 2020820  ET TROJAN Volatile Cedar DNS Lookup (erdotntexplore.info); [1
20,8122015/04/02 2020817  ET TROJAN Volatile Cedar DNS Lookup (dotnetexplorer.info); [1
< 121  122  123  124  125  126  127  128  129  130 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.