시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
23,4612016/08/14 2023051  ET CURRENT_EVENTS Tech Support Phone Scam Landing Aug 12 M1;  
23,4602016/08/14 2023058  ET CURRENT_EVENTS Tech Support Phone Scam Landing M2 Aug 12 2016;  
23,4592016/08/14 2023057  ET CURRENT_EVENTS Tech Support Phone Scam Landing M1 Aug 12 2016;  
23,4582016/08/14 2023052  ET CURRENT_EVENTS Tech Support Phone Scam Landing Aug 12 M2;  
23,4572016/08/14 2023055  ET CURRENT_EVENTS Tech Support Phone Scam Landing (err.mp3) Aug 12 2016;  
23,4562016/08/14 2023056  ET CURRENT_EVENTS Tech Support Phone Scam Landing (msg.mp3) Aug 12 2016;  
23,4552016/08/12 2023048  ET CURRENT_EVENTS Successful Generic Adobe Shared Document Phish Aug 11 2016;  
23,4542016/08/12 2023049  ET TROJAN Monsoon Tinytyphon CnC Beacon GET; [1
23,4532016/08/12 2023050  ET TROJAN Monsoon Tinytyphon CnC Beacon Exfiltrating Docs; [1
23,4522016/08/12 2023047  ET CURRENT_EVENTS Adobe Shared Document Phishing Landing Nov 19 2015;  
23,4512016/08/11 2023028  ET TROJAN RAMNIT.A M1; [1
23,4502016/08/11 2023036  ET CURRENT_EVENTS EITest Flash Redirect Aug 09 2016;  
23,4492016/08/11 2023031  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gootkit C2); [1
23,4482016/08/11 2023034  ET TROJAN Linux/Lady CnC Beacon 1; [1
23,4472016/08/11 2023035  ET TROJAN Linux/Lady CnC Beacon 2; [1
23,4462016/08/11 2023033  ET TROJAN Win32/Radonskra.B C2 Check-in; [1
23,4452016/08/11 2023029  ET TROJAN RAMNIT.A M2; [1
23,4442016/08/11 2023030  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gootkit C2); [1
23,4432016/08/11 2023032  ET TROJAN ProjectSauron Remsec CnC Beacon (hardcoded HTTP headers); [1,2
23,4422016/08/10 2023017  ET TELNET SUSPICIOUS busybox shell; [1
23,4412016/08/10 2023020  ET TROJAN ProjectSauron Remsec DNS Lookup (rapidcomments.com); [1,2
23,4402016/08/10 2023023  ET TROJAN ProjectSauron Remsec DNS Lookup (flowershop22.110mb.com); [1
23,4392016/08/10 2023018  ET TELNET SUSPICIOUS busybox enable; [1
23,4382016/08/10 2023021  ET TROJAN ProjectSauron Remsec DNS Lookup (bikessport.com); [1,2
23,4372016/08/10 2023022  ET TROJAN ProjectSauron Remsec DNS Lookup (myhomemusic.com); [1,2
23,4362016/08/10 2023016  ET TELNET SUSPICIOUS Path to BusyBox; [1
23,4352016/08/10 2023019  ET TELNET busybox MIRAI hackers - Possible Brute Force Attack; [1
23,4342016/08/07 2023015  ET MALWARE Malicious Chrome Extension;  
23,4332016/08/06 2103461  GPL EXPLOIT WEB-MISC JBoss RMI class download service directory listing attempt; [1
23,4322016/08/03 2022997  ET TROJAN Ransomware Locky .onion Payment Domain (zjfq4lnfbs7pncr5);  
23,4312016/08/03 2022998  ET CURRENT_EVENTS Evil Redirector Leading to EK Aug1 2016;  
23,4302016/08/03 2022996  ET INFO QUIC UDP Internet Connections Protocol Client Hello (OUTBOUND); [1
23,4292016/08/03 2022995  ET CURRENT_EVENTS Evil Redirector Leading To EK Jul 30 M1;  
23,4282016/07/31 2022991  ET CURRENT_EVENTS Tech Support Phone Scam Landing Jul 29 M1;  
23,4272016/07/31 2022994  ET CURRENT_EVENTS Tech Support Phone Scam Landing Jul 29 M4;  
23,4262016/07/31 2022992  ET CURRENT_EVENTS Tech Support Phone Scam Landing Jul 29 M2;  
23,4252016/07/31 2022993  ET CURRENT_EVENTS Tech Support Phone Scam Landing Jul 29 M3;  
23,4242016/07/30 2404584  ET CNC Ransomware Tracker Reported CnC Server group 185; [1,2
23,4232016/07/30 2404588  ET CNC Ransomware Tracker Reported CnC Server group 189; [1,2
23,4222016/07/30 2404590  ET CNC Ransomware Tracker Reported CnC Server group 191; [1,2
23,4212016/07/30 2404589  ET CNC Ransomware Tracker Reported CnC Server group 190; [1,2
23,4202016/07/30 2404593  ET CNC Ransomware Tracker Reported CnC Server group 194; [1,2
23,4192016/07/30 2404597  ET CNC Ransomware Tracker Reported CnC Server group 198; [1,2
23,4182016/07/30 2404592  ET CNC Ransomware Tracker Reported CnC Server group 193; [1,2
23,4172016/07/30 2404586  ET CNC Ransomware Tracker Reported CnC Server group 187; [1,2
23,4162016/07/30 2404591  ET CNC Ransomware Tracker Reported CnC Server group 192; [1,2
23,4152016/07/30 2404595  ET CNC Ransomware Tracker Reported CnC Server group 196; [1,2
23,4142016/07/30 2404594  ET CNC Ransomware Tracker Reported CnC Server group 195; [1,2
23,4132016/07/30 2404587  ET CNC Ransomware Tracker Reported CnC Server group 188; [1,2
23,4122016/07/30 2404596  ET CNC Ransomware Tracker Reported CnC Server group 197; [1,2
< 71  72  73  74  75  76  77  78  79  80 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.