시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
20,6612015/03/12 2020660  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6602015/03/12 2020661  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6592015/03/12 2020664  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6582015/03/12 2020667  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6572015/03/12 2020659  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6562015/03/12 2020663  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6552015/03/12 2020658  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6542015/03/12 2020662  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6532015/03/11 2020657  ET TROJAN Possible malicious Office doc hidden in XML file; [1
20,6522015/03/11 2020655  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Checkin 2; [1
20,6512015/03/11 2020652  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Known Domain (bagacaveia.ru); [1
20,6502015/03/11 2020656  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Checkin 3; [1
20,6492015/03/11 2020653  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Firefox Plug-In Download; [1
20,6482015/03/11 2020654  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Checkin 1; [1
20,6472015/03/11 2020650  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Known Domain (bagacaoutra.ru); [1
20,6462015/03/11 2020651  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Known Domain (bagacavoltou.ru); [1
20,6452015/03/11 2020649  ET CURRENT_EVENTS Possible CryptoWall download from e-mail link March 9 2015;  
20,6442015/03/11 2020648  ET WEB_SERVER Possible CVE-2015-1427 Elastic Search Sandbox Escape Remote Code Execution Attempt; [1
20,6432015/03/11 2020647  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
20,6422015/03/11 2020645  ET TROJAN Win32/Trapwot FakeAV Post Infection CnC Beacon;  
20,6412015/03/11 2020646  ET TROJAN Win32/Trapwot FakeAV Checkin;  
20,6402015/03/08 2020644  ET CURRENT_EVENTS Unknown Malicious Second Stage Download URI Struct M2 Feb 06 2015;  
20,6392015/03/08 2020640  ET POLICY DNS Query to .onion proxy Domain (cheetosnotburitos.com);  
20,6382015/03/08 2020641  ET POLICY DNS Query to .onion proxy Domain (optionsketchupay.com);  
20,6372015/03/08 2020643  ET CURRENT_EVENTS Unknown Malicious Second Stage Download URI Struct M1 Feb 06 2015;  
20,6362015/03/08 2020638  ET CURRENT_EVENTS Evil Redirector Leading to EK Mar 06 2015;  
20,6352015/03/08 2020642  ET POLICY DNS Query to .onion proxy Domain (solutionsaccountor.com);  
20,6342015/03/08 2020639  ET POLICY DNS Query to .onion proxy Domain (optionstopaytos.com);  
20,6332015/03/08 2020636  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6322015/03/08 2020637  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6312015/03/08 2020635  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6302015/03/08 2020633  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6292015/03/08 2020632  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6282015/03/08 2020634  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1
20,6272015/03/08 2020630  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6262015/03/08 2020631  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1
20,6252015/03/08 2020627  ET MALWARE W32/WinWrapper.Adware Initial Install Beacon;  
20,6242015/03/08 2020629  ET MALWARE MALWARE W32/WinWrapper.Adware User-Agent;  
20,6232015/03/08 2020628  ET MALWARE MALWARE W32/WinWrapper.Adware POST CnC Beacon;  
20,6222015/03/08 2020625  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (TorrentLocker CnC); [1
20,6212015/03/08 2020626  ET CURRENT_EVENTS Fiesta EK Landing URI Struct March 6 2015;  
20,6202015/03/07 2020623  ET CURRENT_EVENTS Possible Tsukuba Banker Edwards Packed proxy.pac; [1
20,6192015/03/07 2020624  ET CURRENT_EVENTS Possible Upatre SSL Cert www.eshaalfoundation.org;  
20,6182015/03/07 2020622  ET CURRENT_EVENTS rechnung zip file download;  
20,6172015/03/07 2020621  ET TROJAN Trojan.Bayrob Keepalive;  
20,6162015/03/06 2020613  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 54; [1,2
20,6152015/03/06 2020616  ET TROJAN Teerac/CryptoFortress .onion Proxy Domain (h63rbx7gkd3gygag);  
20,6142015/03/06 2020619  ET POLICY DNS Query to .onion proxy Domain (bolistatapay.com);  
20,6132015/03/06 2020620  ET POLICY DNS Query to .onion proxy Domain (sshowmethemoney.com);  
20,6122015/03/06 2020618  ET POLICY DNS Query to .onion proxy Domain (torstorm.org);  
< 121  122  123  124  125  126  127  128  129  130 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.