시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
16,8112015/01/20 2019773  ET CURRENT_EVENTS Possible Internet Explorer CVE-2014-6332 Common Construct b64 1 (Observed in Archie EK);  
16,8102015/01/20 2019771  ET TROJAN W32/AntiBreach Possible Activation Attempt; [1
16,8092015/01/20 2019770  ET CURRENT_EVENTS Archie EK T2 SWF Exploit Struct Nov 20 2014;  
16,8082015/01/20 2019769  ET CURRENT_EVENTS Archie EK T2 Landing Struct Nov 20 2014;  
16,8072015/01/20 2019768  ET CURRENT_EVENTS Archie EK T2 PD Struct Nov 20 2014;  
16,8062015/01/20 2019767  ET TROJAN Rogue.Win32/FakePAV Checkin;  
16,8052015/01/20 2019766  ET CURRENT_EVENTS FlashPack Flash Exploit Nov 20 2014;  
16,8042015/01/20 2019765  ET CURRENT_EVENTS DRIVEBY Nuclear EK SWF;  
16,8032015/01/20 2019764  ET CURRENT_EVENTS Job314/Neutrino Reboot EK Payload Nov 20 2014;  
16,8022015/01/20 2019763  ET CURRENT_EVENTS Job314/Neutrino Reboot EK Flash Exploit Nov 20 2014;  
16,8012015/01/20 2019762  ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing Nov 20 2014;  
16,8002015/01/20 2019761  ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing Nov 20 2014;  
16,7992015/01/20 2019760  ET TROJAN Rerdom/Asprox CnC Beacon; [1,2
16,7982015/01/20 2019759  ET TROJAN Win32/Zemot Requesting PE;  
16,7972015/01/20 2019758  ET TROJAN Bamital Checkin Response 2;  
16,7962015/01/20 2019757  ET TROJAN Bamital Checkin Response 1;  
16,7952015/01/20 2019756  ET TROJAN Bamital Checkin;  
16,7942015/01/20 2019755  ET TROJAN Bamital Headers - Likely CnC Beacon;  
16,7932015/01/20 2019754  ET TROJAN Bamital Connectivity Check;  
16,7922015/01/20 2019753  ET CURRENT_EVENTS Possible FlashPack (FlashOnly) Payload Struct Nov 19 2014;  
16,7912015/01/20 2019752  ET CURRENT_EVENTS Possible Sweet Orange CVE-2014-6332 Payload Request;  
16,7902015/01/20 2019751  ET CURRENT_EVENTS SweetOrange EK Landing Nov 19 2014;  
16,7892015/01/20 2019750  ET WEB_CLIENT Samsung Galaxy Knox Android Browser RCE smdm attempt; [1,2
16,7882015/01/20 2019749  ET WEB_SERVER FOX-SRT - Backdoor - CryptoPHP Shell C2 POST (fsockopen); [1
16,7872015/01/20 2019748  ET WEB_SERVER FOX-SRT - Backdoor - CryptoPHP Shell C2 POST; [1
16,7862015/01/20 2019747  ET TROJAN ELF_BASHLITE.SMB Dropping Files; [1
16,7852015/01/20 2019746  ET POLICY Bitmessage Activity; [1
16,7842015/01/20 2019745  ET CURRENT_EVENTS SPL2 EK Flash Exploit Nov 18 2014;  
16,7832015/01/20 2019744  ET CURRENT_EVENTS SPL2 EK JS HashLib Nov 18 2014;  
16,7822015/01/20 2019743  ET CURRENT_EVENTS SPL2 EK PluginDetect Data Hash Nov 18 2014;  
16,7812015/01/20 2019742  ET CURRENT_EVENTS SPL2 EK Landing Nov 18 2014;  
16,7802015/01/20 2019741  ET TROJAN W32/Matsnu.Backdoor CnC Beacon; [1
16,7792015/01/20 2019740  ET TROJAN OSX/AlienSpy RAT Checkin; [1
16,7782015/01/20 2019739  ET TROJAN W32/AlienSpy RAT Checkin; [1
16,7772015/01/20 2019738  ET TROJAN AlienSpy RAT Checkin Set; [1
16,7762015/01/20 2019737  ET POLICY IP Check wtfismyip.com;  
16,7752015/01/20 2019736  ET TROJAN Likely CryptoWall 2.0 .onion Proxy domain lookup; [1
16,7742015/01/20 2019735  ET EXPLOIT Possible Internet Explorer VBscript failure to handle error case information disclosure CVE-2014-6332 Common Construct Hex Encode;  
16,7732015/01/20 2019734  ET EXPLOIT Possible Internet Explorer VBscript failure to handle error case information disclosure CVE-2014-6332 Common Construct;  
16,7722015/01/20 2019733  ET EXPLOIT Possible Internet Explorer VBscript failure to handle error case information disclosure CVE-2014-6332 Common Function Name;  
16,7712015/01/20 2019732  ET WEB_CLIENT Possible Internet Explorer VBscript failure to handle error case information disclosure CVE-2014-6332 Percent Hex Encode;  
16,7702015/01/20 2019731  ET TROJAN OSX/WireLurker HTTP Request for manhuaba.com.cn; [1
16,7692015/01/20 2019730  ET WEB_CLIENT GENERIC Possible IE Memory Corruption CollectGarbage with DOM Reset;  
16,7682015/01/20 2019729  ET TROJAN Malware Connectivity Check to Google;  
16,7672015/01/20 2019728  ET WEB_SPECIFIC_APPS Wordpress Slideshow Gallery 1.4.6 - Shell Upload; [1
16,7662015/01/20 2019727  ET CURRENT_EVENTS NullHole EK Exploit URI Struct;  
16,7652015/01/20 2019726  ET CURRENT_EVENTS Archie EK Landing URI Struct 2 Nov 17 2014;  
16,7642015/01/20 2019725  ET CURRENT_EVENTS Archie EK Flash Exploit URI Struct 2 Nov 17 2014;  
16,7632015/01/20 2019724  ET CURRENT_EVENTS Archie EK Flash Exploit URI Struct Nov 17 2014;  
16,7622015/01/20 2019723  ET CURRENT_EVENTS Archie EK Landing Nov 17 2014 M2;  
< 201  202  203  204  205  206  207  208  209  210 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.