시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
16,9112015/01/20 2019876  ET SCAN SSH BruteForce Tool with fake PUTTY version;  
16,9102015/01/20 2019875  ET CURRENT_EVENTS Possible Dyre SSL Cert Dec 4 2014;  
16,9092015/01/20 2019874  ET CURRENT_EVENTS Nuclear EK Landing Dec 03 2014;  
16,9082015/01/20 2019873  ET CURRENT_EVENTS DRIVEBY Nuclear EK Payload;  
16,9072015/01/20 2019872  ET CURRENT_EVENTS DRIVEBY Nuclear EK Payload (flowbits set);  
16,9062015/01/20 2019871  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,9052015/01/20 2019870  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,9042015/01/20 2019869  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,9032015/01/20 2019868  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,9022015/01/20 2019867  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,9012015/01/20 2019866  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,9002015/01/20 2019865  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8992015/01/20 2019864  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8982015/01/20 2019863  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8972015/01/20 2019862  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8962015/01/20 2019861  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8952015/01/20 2019860  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8942015/01/20 2019859  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8932015/01/20 2019858  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8922015/01/20 2019857  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8912015/01/20 2019856  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8902015/01/20 2019855  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8892015/01/20 2019854  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8882015/01/20 2019853  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8872015/01/20 2019852  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8862015/01/20 2019851  ET TROJAN DNS Query for Operation Cleaver Domain; [1
16,8852015/01/20 2019850  ET WEB_CLIENT PDF With Hidden Embedded File; [1
16,8842015/01/20 2019849  ET TROJAN Possible Sony Breach Wiper Malware Download; [1
16,8832015/01/20 2019848  ET TROJAN Sony Breach Wiper Callout; [1
16,8822015/01/20 2019847  ET TROJAN Upatre Common URI Struct Dec 01 2014;  
16,8812015/01/20 2019846  ET CURRENT_EVENTS DRIVEBY Nuclear EK SWF;  
16,8802015/01/20 2019845  ET CURRENT_EVENTS DRIVEBY Nuclear EK SWF;  
16,8792015/01/20 2019844  ET CURRENT_EVENTS DRIVEBY Nuclear EK Exploit Struct;  
16,8782015/01/20 2019843  ET TROJAN Vawtrak/NeverQuest Posting Data;  
16,8772015/01/20 2019842  ET WEB_CLIENT Possible Internet Explorer VBscript CVE-2014-6332 multiple redim preserve;  
16,8762015/01/20 2019841  ET TROJAN Win32/Swrort.A Checkin 2; [1
16,8752015/01/20 2019840  ET TROJAN Trojan/MSIL.bfsx Checkin;  
16,8742015/01/20 2019839  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,8732015/01/20 2019838  ET TROJAN HompesA Activity;  
16,8722015/01/20 2019837  ET WEB_CLIENT SUSPICIOUS Possible Office Doc with Embedded VBA Project (Wide);  
16,8712015/01/20 2019836  ET WEB_CLIENT SUSPICIOUS Possible Office Doc with Embedded VBA Project;  
16,8702015/01/20 2019835  ET WEB_CLIENT SUSPICIOUS Possible Office Doc with Embedded VBA Project;  
16,8692015/01/20 2019834  ET INFO Microsoft Compact Office Document Format File Download;  
16,8682015/01/20 2019833  ET TROJAN Possible Dyre SSL Cert (fake state);  
16,8672015/01/20 2019832  ET TROJAN Possible Dyre SSL Cert (fake org name);  
16,8662015/01/20 2019831  ET TROJAN W32/Syndicasec.Backdoor CnC Beacon; [1
16,8652015/01/20 2019830  ET TROJAN Dridex v2 POST Checkin; [1
16,8642015/01/20 2019829  ET TROJAN W32/Fin4.InfoStealer Uploading User Credentials CnC Beacon; [1
16,8632015/01/20 2019828  ET TROJAN Trojan/W32.KRBanker.60928.C Checkin;  
16,8622015/01/20 2019827  ET TROJAN W32/Wadolin.Downloader CnC Beacon;  
< 201  202  203  204  205  206  207  208  209  210 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.