시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
16,9612015/01/20 2019926  ET TROJAN HawkEye Keylogger Report SMTP;  
16,9602015/01/20 2019925  ET TROJAN Win32/Dalexis.A Possible SSL Cert (cargol.cat);  
16,9592015/01/20 2019924  ET TROJAN Win32/Dalexis.A Possible SSL Cert (ppc.cba.pl);  
16,9582015/01/20 2019923  ET TROJAN Win32/Dalexis.A Possible SSL Cert (smartoptionsinc.com);  
16,9572015/01/20 2019922  ET EXPLOIT Possible GoldenPac Priv Esc in-use; [1
16,9562015/01/20 2019921  ET TROJAN LinuxNet.perlbot Checkin Via IRC;  
16,9552015/01/20 2019920  ET CURRENT_EVENTS Malicious JS Leading to Fiesta EK;  
16,9542015/01/20 2019919  ET TROJAN Cloud Atlas CnC Beacon; [1
16,9532015/01/20 2019918  ET DELETED Win32/Teerac.A SSL Cert;  
16,9522015/01/20 2019917  ET CURRENT_EVENTS Nuclear EK SilverLight Exploit;  
16,9512015/01/20 2019916  ET CURRENT_EVENTS HanJuan Landing Dec 10 2014;  
16,9502015/01/20 2019915  ET TROJAN Cloud Atlas Request to WebDAV CloudMe; [1
16,9492015/01/20 2019914  ET POLICY HTTP Request to WebDAV CloudMe Service; [1
16,9482015/01/20 2019913  ET TROJAN DNS Query for Cloud Atlas blackberry-support.herokuapp.com; [1
16,9472015/01/20 2019912  ET TROJAN DNS Query for Cloud Atlas ecolines.es; [1
16,9462015/01/20 2019911  ET TROJAN DNS Query for Cloud Atlas sanygroup.co.uk; [1
16,9452015/01/20 2019910  ET TROJAN DNS Query for Cloud Atlas haarmannsi.cz; [1
16,9442015/01/20 2019909  ET TROJAN Win32/Teerac.A Tor Based Locker .onion Proxy Domain;  
16,9432015/01/20 2019908  ET CURRENT_EVENTS Evil Flash Redirector to Job314/Neutrino Reboot EK;  
16,9422015/01/20 2019907  ET CURRENT_EVENTS Gootkit SSL Cert Dec 10 2014;  
16,9412015/01/20 2019906  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Cridex CnC); [1
16,9402015/01/20 2019905  ET CURRENT_EVENTS QNAP Shellshock script retrieval; [1,2
16,9392015/01/20 2019904  ET CURRENT_EVENTS QNAP Shellshock CVE-2014-6271; [1,2
16,9382015/01/20 2019903  ET WEB_SPECIFIC_APPS Pandora FMS SQLi; [1
16,9372015/01/20 2019902  ET TROJAN VirRansom/VirLock Checkin Response;  
16,9362015/01/20 2019901  ET TROJAN VirRansom/VirLock Checkin;  
16,9352015/01/20 2019900  ET WEB_SERVER Insomnia Shell Outbound CMD Banner; [1
16,9342015/01/20 2019899  ET WEB_SERVER Insomnia Shell HTTP Request; [1
16,9332015/01/20 2019898  ET POLICY I2P Retrieving reseed info;  
16,9322015/01/20 2019897  ET EXPLOIT Possible PYKEK Priv Esc in-use; [1
16,9312015/01/20 2019896  ET TROJAN Backdoor.Linux.Turla Download; [1
16,9302015/01/20 2019895  ET CURRENT_EVENTS Malicious Redirect Leading to EK Dec 08 2014;  
16,9292015/01/20 2019894  ET CURRENT_EVENTS Probable malicious download from e-mail link /1.php;  
16,9282015/01/20 2019893  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (1);  
16,9272015/01/20 2019892  ET CURRENT_EVENTS Malicious Iframe Leading to EK Dec 08 2014;  
16,9262015/01/20 2019891  ET TROJAN W32/Dridex POST CnC Beacon;  
16,9252015/01/20 2019890  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,9242015/01/20 2019889  ET TROJAN Possible Dyre DGA NXDOMAIN Responses (.so);  
16,9232015/01/20 2019888  ET TROJAN Possible Dyre DGA NXDOMAIN Responses (.tk);  
16,9222015/01/20 2019887  ET TROJAN Possible Dyre DGA NXDOMAIN Responses (.cn);  
16,9212015/01/20 2019886  ET TROJAN Possible Dyre DGA NXDOMAIN Responses (.hk);  
16,9202015/01/20 2019885  ET TROJAN Possible Dyre DGA NXDOMAIN Responses (.in);  
16,9192015/01/20 2019884  ET TROJAN Possible Dyre DGA NXDOMAIN Responses (.to);  
16,9182015/01/20 2019883  ET TROJAN Possible Dyre DGA NXDOMAIN Responses (.ws);  
16,9172015/01/20 2019882  ET TROJAN Possible Dyre DGA NXDOMAIN Responses (.cc);  
16,9162015/01/20 2019881  ET TROJAN Chthonic Check-in;  
16,9152015/01/20 2019880  ET WEB_SERVER Double Encoded Characters in URI (../);  
16,9142015/01/20 2019879  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,9132015/01/20 2019878  ET TROJAN Destover RAT Check-in; [1
16,9122015/01/20 2019877  ET CURRENT_EVENTS MS Office Macro Dridex Download URI Dec 5 2014; [1
< 201  202  203  204  205  206  207  208  209  210 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.