시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
16,7112015/01/20 2019672  ET CURRENT_EVENTS Possible HanJuan EK Flash Payload DL;  
16,7102015/01/20 2019671  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
16,7092015/01/20 2019670  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
16,7082015/01/20 2019669  ET CURRENT_EVENTS Nuclear SilverLight Exploit;  
16,7072015/01/20 2019668  ET CURRENT_EVENTS Nuclear SilverLight URI Struct (noalert);  
16,7062015/01/20 2019667  ET TROJAN OSX/WireLurker DNS Query Domain www.comeinbaby.com; [1
16,7052015/01/20 2019666  ET TROJAN OSX/WireLurker HTTP Request for www.comeinbaby.com; [1
16,7042015/01/20 2019665  ET TROJAN OSX/WireLurker checkin; [1
16,7032015/01/20 2019664  ET TROJAN iOS/WireLurker CnC Beacon; [1
16,7022015/01/20 2019663  ET TROJAN OSX/WireLurker CnC Beacon; [1
16,7012015/01/20 2019662  ET TROJAN OSX/WireLurker CnC Beacon; [1
16,7002015/01/20 2019661  ET TROJAN OSX/WireLurker Checkin; [1
16,6992015/01/20 2019660  ET TROJAN OSX/WireLurker User-agent (globalupdate); [1
16,6982015/01/20 2019659  ET CURRENT_EVENTS Archie EK Exploit IE URI Struct;  
16,6972015/01/20 2019658  ET CURRENT_EVENTS Archie EK Exploit SilverLight URI Struct;  
16,6962015/01/20 2019657  ET CURRENT_EVENTS Archie EK Exploit Flash URI Struct;  
16,6952015/01/20 2019656  ET CURRENT_EVENTS Archie EK Exploit Flash URI Struct;  
16,6942015/01/20 2019655  ET CURRENT_EVENTS Fiesta EK Landing Nov 05 2014;  
16,6932015/01/20 2019654  ET TROJAN Trojan.FakeMS Checkin;  
16,6922015/01/20 2019653  ET TROJAN Win32/Spy.Banker.ABCG Checkin;  
16,6912015/01/20 2019652  ET CURRENT_EVENTS Win32/Trustezeb.E SSL Cert Nov 05 2014;  
16,6902015/01/20 2019651  ET CURRENT_EVENTS Possible Dyre SSL Cert Nov 05 2014;  
16,6892015/01/20 2019650  ET TROJAN Possible Malicious Attachment With Double Extension Ending In EXE;  
16,6882015/01/20 2019649  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
16,6872015/01/20 2019648  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre CnC); [1
16,6862015/01/20 2019647  ET CURRENT_EVENTS Sweet Orange Landing Nov 04 2013;  
16,6852015/01/20 2019646  ET TROJAN Bedep SSL Cert; [1
16,6842015/01/20 2019645  ET TROJAN Bedep SSL Cert; [1
16,6832015/01/20 2019644  ET TROJAN Shellshock Backdoor.Perl.Shellbot.F retrieval; [1
16,6822015/01/20 2019643  ET CURRENT_EVENTS Possible Sweet Orange Landing Nov 3 2014;  
16,6812015/01/20 2019642  ET CURRENT_EVENTS Possible Sweet Orange redirection Nov 4 2014; [1
16,6802015/01/20 2019641  ET TROJAN Sofacy HTTP Request malwarecheck.info; [1
16,6792015/01/20 2019640  ET TROJAN Sofacy DNS Lookup malwarecheck.info; [1
16,6782015/01/20 2019639  ET CURRENT_EVENTS Win32.Zbot.umpz SSL Cert Nov 4 2014;  
16,6772015/01/20 2019638  ET CURRENT_EVENTS Evil EK Redirector Cookie Nov 03 2014;  
16,6762015/01/20 2019637  ET TROJAN Shellshock Backdoor.Perl.Shellbot.F C2; [1
16,6752015/01/20 2019636  ET TROJAN Backoff Variant Checkin;  
16,6742015/01/20 2019635  ET TROJAN ROM/BackOff C2 SSL Cert; [1
16,6732015/01/20 2019634  ET CURRENT_EVENTS Sweet Orange Landing Nov 3 2014;  
16,6722015/01/20 2019633  ET TROJAN DirectsX Checkin Response; [1
16,6712015/01/20 2019632  ET TROJAN AnubisNetworks Sinkhole UDP Connection;  
16,6702015/01/20 2019631  ET TROJAN Win32.TrojanProxy Configuration file Download; [1
16,6692015/01/20 2019630  ET TROJAN AnubisNetworks Sinkhole HTTP Response - 195.22.26.192/26;  
16,6682015/01/20 2019629  ET TROJAN AnubisNetworks Sinkhole TCP Connection;  
16,6672015/01/20 2019628  ET TROJAN AnubisNetworks Sinkhole SSL Cert lolcat - 195.22.26.192/26;  
16,6662015/01/20 2019627  ET WEB_SERVER Possible Cookie Based BackDoor Used in Drupal Attacks; [1
16,6652015/01/20 2019626  ET TROJAN Cohhoc RAT CnC Response; [1
16,6642015/01/20 2019625  ET TROJAN Cohhoc RAT CnC Request; [1
16,6632015/01/20 2019624  ET CURRENT_EVENTS Fiesta SilverLight 5.x Exploit URI Struct;  
16,6622015/01/20 2019623  ET CURRENT_EVENTS Fiesta SilverLight 4.x Exploit URI Struct;  
< 201  202  203  204  205  206  207  208  209  210 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.