시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
16,7612015/01/20 2019722  ET CURRENT_EVENTS Archie EK Landing Nov 17 2014;  
16,7602015/01/20 2019721  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,7592015/01/20 2019720  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
16,7582015/01/20 2019719  ET CURRENT_EVENTS Possible Dyre SSL Cert Nov 17 2014;  
16,7572015/01/20 2019718  ET TROJAN OSX/WireLurker DNS Query Domain manhuaba.com.cn; [1
16,7562015/01/20 2019717  ET TROJAN Alureon Checkin;  
16,7552015/01/20 2019716  ET TROJAN Windows executable base64 encoded in XML;  
16,7542015/01/20 2019715  ET WEB_CLIENT Possible Internet Explorer VBscript failure to handle error case information disclosure obfuscated CVE-2014-6332;  
16,7532015/01/20 2019714  ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile;  
16,7522015/01/20 2019713  ET TROJAN Possible Asprox Pizza; [1
16,7512015/01/20 2019712  ET TROJAN W32/Keylogger.CI Checkin; [1,2
16,7502015/01/20 2019711  ET TROJAN W32Autorun.worm.aaeh Checkin; [1
16,7492015/01/20 2019710  ET TROJAN VBS/Autorun.J Checkin; [1
16,7482015/01/20 2019709  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,7472015/01/20 2019708  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1
16,7462015/01/20 2019707  ET WEB_CLIENT GENERIC VB ShellExecute Function Inside of VBSCRIPT tag;  
16,7452015/01/20 2019706  ET WEB_CLIENT Possible Internet Explorer VBscript failure to handle error case information disclosure CVE-2014-6332;  
16,7442015/01/20 2019705  ET CURRENT_EVENTS Possible Dyre SSL Cert Nov 12 2014;  
16,7432015/01/20 2019704  ET TROJAN Emotet CnC Beacon;  
16,7422015/01/20 2019703  ET CURRENT_EVENTS Possible Dyre SSL Cert Nov 11 2014;  
16,7412015/01/20 2019702  ET CURRENT_EVENTS Possible Dyre SSL Cert Nov 11 2014;  
16,7402015/01/20 2019701  ET CURRENT_EVENTS Possible Dyre SSL Cert Nov 11 2014;  
16,7392015/01/20 2019700  ET CURRENT_EVENTS Possible Dyre SSL Cert Nov 11 2014;  
16,7382015/01/20 2019699  ET CURRENT_EVENTS Possible Dyre SSL Cert Nov 11 2014;  
16,7372015/01/20 2019698  ET CURRENT_EVENTS Win32/Zbot SSL Cert Nov 11 2014;  
16,7362015/01/20 2019697  ET CURRENT_EVENTS Possible Dridex Campaign Download Nov 11 2014;  
16,7352015/01/20 2019696  ET CURRENT_EVENTS Possible Dridex Campaign Download Nov 11 2014;  
16,7342015/01/20 2019695  ET TROJAN Ponomocup Post Infection DNS Lookup fasternation;  
16,7332015/01/20 2019694  ET TROJAN Ponomocup Post Infection DNS Lookup intohave;  
16,7322015/01/20 2019693  ET TROJAN Emotet Checkin;  
16,7312015/01/20 2019692  ET TROJAN Possible Emotet DGA NXDOMAIN Responses;  
16,7302015/01/20 2019691  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
16,7292015/01/20 2019690  ET CURRENT_EVENTS Archie EK Landing Nov 10 2014;  
16,7282015/01/20 2019689  ET CURRENT_EVENTS Job314 EK Landing Nov 10 2014;  
16,7272015/01/20 2019688  ET TROJAN Win32/Roficor.A (Darkhotel) Checkin 2; [1
16,7262015/01/20 2019687  ET TROJAN Win32/Roficor.A (Darkhotel) Checkin 1; [1
16,7252015/01/20 2019686  ET EXPLOIT Belkin N750 Buffer Overflow Attempt; [1
16,7242015/01/20 2019685  ET CURRENT_EVENTS Archie EK Landing URI Struct;  
16,7232015/01/20 2019684  ET CURRENT_EVENTS Evil EK Redirector Cookie Nov 07 2014; [1
16,7222015/01/20 2019683  ET TROJAN Miuref/Boaxxe Checkin;  
16,7212015/01/20 2019682  ET CURRENT_EVENTS Operation Huyao Phishing Page Nov 07 2014; [1
16,7202015/01/20 2019681  ET CURRENT_EVENTS Operation Huyao Landing Page Nov 07 2014; [1
16,7192015/01/20 2019680  ET TROJAN Possible Archie EK Payload Checkin GET;  
16,7182015/01/20 2019679  ET TROJAN Archie EK Payload Checkin POST;  
16,7172015/01/20 2019678  ET TROJAN Ursnif Checkin;  
16,7162015/01/20 2019677  ET CURRENT_EVENTS Archie EK Exploit Flash URI Struct;  
16,7152015/01/20 2019676  ET CURRENT_EVENTS Nuclear EK Payload URI Struct Nov 07 2014;  
16,7142015/01/20 2019675  ET CURRENT_EVENTS Possible HanJuan EK Actor Specific Injected iframe;  
16,7132015/01/20 2019674  ET CURRENT_EVENTS Possible HanJuan Flash Exploit;  
16,7122015/01/20 2019673  ET CURRENT_EVENTS Possible HanJuan EK URI Struct Actor Specific;  
< 201  202  203  204  205  206  207  208  209  210 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.