번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
20,911 | 2015/04/17 | 2020914 | ET POLICY Exe32Pack Packed Executable Download; |
20,910 | 2015/04/17 | 2020916 | ET EXPLOIT Possible Redirect to SMB exploit attempt - 302; [1] |
20,909 | 2015/04/17 | 2020917 | ET EXPLOIT Possible Redirect to SMB exploit attempt - 301; [1] |
20,908 | 2015/04/17 | 2020913 | ET TROJAN W32/Farfli.BHQ!tr Dropper CnC Beacon 2; |
20,907 | 2015/04/17 | 2020915 | ET TROJAN CryptoLocker .onion Proxy Domain (33p5mqkaj22irv4z); [1] |
20,906 | 2015/04/17 | 2020912 | ET WEB_SERVER Possible IIS Integer Overflow DoS (CVE-2015-1635); |
20,905 | 2015/04/16 | 2020910 | ET TROJAN Win32/Ruckguv.A Requesting Payload; [1] |
20,904 | 2015/04/16 | 2020911 | ET CURRENT_EVENTS Likely Dridex Multi-part Macro Download M1; |
20,903 | 2015/04/16 | 2020909 | ET TROJAN CoinVault CnC Beacon Response; [1] |
20,902 | 2015/04/16 | 2020908 | ET TROJAN CoinVault CnC Beacon M2; [1] |
20,901 | 2015/04/16 | 2020907 | ET TROJAN CoinVault CnC Beacon M1; [1] |
20,900 | 2015/04/16 | 2020906 | ET TROJAN CoinVault Mailer CnC Beacon; [1] |
20,899 | 2015/04/15 | 2020901 | ET TROJAN Possible APT30 Fake Mozilla UA; [1] |
20,898 | 2015/04/15 | 2020905 | ET CURRENT_EVENTS SPL2 EK Post-Compromise Data Dump M3; |
20,897 | 2015/04/15 | 2020903 | ET CURRENT_EVENTS SPL2 EK Post-Compromise Data Dump M1; |
20,896 | 2015/04/15 | 2020900 | ET TROJAN Emotet v2 Exfiltrating Outlook information; [1] |
20,895 | 2015/04/15 | 2020902 | ET TROJAN LankerBoy HTTP CnC Beacon; |
20,894 | 2015/04/15 | 2020904 | ET CURRENT_EVENTS SPL2 EK Post-Compromise Data Dump M2; |
20,893 | 2015/04/15 | 2020899 | ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution; [1] |
20,892 | 2015/04/15 | 2020898 | ET TROJAN Possible APT30 or Win32/Nuclear HTTP Framework POST; [1] |
20,891 | 2015/04/15 | 2020897 | ET TROJAN Possible APT30 or Win32/Nuclear HTTP Framework; [1] |
20,890 | 2015/04/15 | 2020896 | ET CURRENT_EVENTS DRIVEBY Router DNS Changer Apr 07 2015 M2; |
20,889 | 2015/04/12 | 2020894 | ET CURRENT_EVENTS DRIVEBY EXE Embeded in Page Likely Evil M2; |
20,888 | 2015/04/12 | 2020895 | ET CURRENT_EVENTS Magnitude Flash Exploit (IE) M2; |
20,887 | 2015/04/12 | 2020892 | ET TROJAN Possible Maldoc Retrieving Dridex from pastebin; |
20,886 | 2015/04/12 | 2020893 | ET CURRENT_EVENTS DRIVEBY EXE Embeded in Page Likely Evil M1; |
20,885 | 2015/04/12 | 2020891 | ET TROJAN Operation Buhtrap CnC Beacon 2; [1] |
20,884 | 2015/04/12 | 2020890 | ET TROJAN Operation Buhtrap CnC Beacon 1; [1] |
20,883 | 2015/04/12 | 2020888 | ET INFO invalid.cab domain in SNI; |
20,882 | 2015/04/12 | 2020889 | ET TROJAN Vobus/Beebone Sinkhole DNS Reply; [1] |
20,881 | 2015/04/11 | 2020887 | ET TROJAN Shellshock Worm Checkin; [1] |
20,880 | 2015/04/11 | 2020886 | ET TROJAN Kriptovor External IP Lookup checkip.dyndns.org; [1] |
20,879 | 2015/04/11 | 2020883 | ET TROJAN Kriptovor Checkin; [1] |
20,878 | 2015/04/11 | 2020884 | ET TROJAN Kriptovor SMTP Traffic; [1] |
20,877 | 2015/04/11 | 2020885 | ET TROJAN Kriptovor Retrieving RAR Payload; [1] |
20,876 | 2015/04/10 | 2020882 | ET TROJAN Win32/Teslacrypt Ransomware .onion domain (epmhyca5ol6plmx3); [1] |
20,875 | 2015/04/10 | 2020881 | ET MALWARE PUP Win32/AdWare.Sendori User-Agent; [1] |
20,874 | 2015/04/10 | 2020879 | ET EXPLOIT Linksys WRT54GL DNS Change GET Request; [1] |
20,873 | 2015/04/10 | 2020880 | ET EXPLOIT TP-LINK TL-WR750N DNS Change GET Request; [1] |
20,872 | 2015/04/10 | 2020877 | ET EXPLOIT Known Malicious Router DNS Change GET Request; [1] |
20,871 | 2015/04/10 | 2020878 | ET EXPLOIT TP-LINK TL-WR841N Router DNS Change GET Request; [1] |
20,870 | 2015/04/10 | 2020876 | ET EXPLOIT Tenda ADSL2/2 Router DNS Change GET Request; [1] |
20,869 | 2015/04/10 | 2020874 | ET EXPLOIT Netgear DGN1000B Router DNS Change GET Request; [1] |
20,868 | 2015/04/10 | 2020875 | ET EXPLOIT Belkin G F5D7230-4 Router DNS Change GET Request; [1] |
20,867 | 2015/04/10 | 2020869 | ET POLICY DNS Query to .onion proxy Domain (wh47f2as19.com); |
20,866 | 2015/04/10 | 2020871 | ET EXPLOIT ASUS RT N56U Router DNS Change GET Request 3; [1] |
20,865 | 2015/04/10 | 2020873 | ET EXPLOIT D-link DI604 Known Malicious Router DNS Change GET Request; [1] |
20,864 | 2015/04/10 | 2020872 | ET EXPLOIT TP-LINK Known Malicious Router DNS Change GET Request; [1] |
20,863 | 2015/04/10 | 2020868 | ET EXPLOIT FritzBox RCE GET Request; [1] |
20,862 | 2015/04/10 | 2020864 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1] |
< 121 122 123 124 125 126 127 128 129 130 > |