시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
22,6112016/03/09 2022598  ET TROJAN OSX/KeRanger Ransomware CnC DNS Request 1; [1
22,6102016/03/07 2022596  ET WEB_SERVER Possible Custom Content Type Manager WP Backdoor Access;  
22,6092016/03/06 2022594  ET TROJAN Dridex Base64 Filename;  
22,6082016/03/06 2022595  ET TROJAN Dridex Base64 Executable;  
22,6072016/03/05 2022591  ET CURRENT_EVENTS Fake AV Phone Scam Domain M1 Mar 3;  
22,6062016/03/05 2022592  ET CURRENT_EVENTS Fake AV Phone Scam Domain M2 Mar 3;  
22,6052016/03/05 2022593  ET CURRENT_EVENTS Fake AV Phone Scam Domain M3 Mar 3;  
22,6042016/03/04 2022590  ET TROJAN Ransomware Locky .onion Payment Domain;  
22,6032016/03/04 2022585  ET POLICY Possible SSLv2 Negotiation in Progress Client Master Key SSL2_RC2_128_CBC_WITH_MD5; [1
22,6022016/03/04 2022586  ET POLICY Possible SSLv2 Negotiation in Progress Client Master Key SSL2_RC2_128_CBC_EXPORT40_WITH_MD5; [1
22,6012016/03/04 2022588  ET POLICY Possible SSLv2 Negotiation in Progress Client Master Key SSL2_DES_64_CBC_WITH_MD5; [1
22,6002016/03/04 2022589  ET TROJAN Ransomware Locky .onion Payment Domain;  
22,5992016/03/04 2022582  ET TROJAN jFect HTTP CnC Checkin;  
22,5982016/03/04 2022583  ET POLICY Possible SSLv2 Negotiation in Progress Server Hello; [1
22,5972016/03/04 2022587  ET POLICY Possible SSLv2 Negotiation in Progress ClientMaster Key SSL2_IDEA_128_CBC_WITH_MD5; [1
22,5962016/03/04 2022584  ET POLICY Possible SSLv2 Negotiation in Progress Client Master Key SSL2_RC4_128_WITH_MD5; [1
22,5952016/03/02 2022581  ET CURRENT_EVENTS MySQL Malicious Scanning 3; [1
22,5942016/03/02 2022580  ET CURRENT_EVENTS MySQL Malicious Scanning 2; [1
22,5932016/03/02 2022579  ET CURRENT_EVENTS MySQL Malicious Scanning 1; [1
22,5922016/03/02 2022574  ET CURRENT_EVENTS Possible Fake AV Phone Scam Landing Feb 26;  
22,5912016/03/02 2022573  ET TROJAN Andromeda Download;  
22,5902016/03/02 2022576  ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain M2 Feb 29;  
22,5892016/03/02 2022575  ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain M1 Feb 29;  
22,5882016/03/02 2022572  ET TROJAN Andromeda Download (set);  
22,5872016/03/02 2022577  ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain M3 Feb 29;  
22,5862016/02/28 2022571  ET TROJAN Malicious SSL certificate detected (Geodo MITM); [1
22,5852016/02/28 2022570  ET CURRENT_EVENTS Possible Spam/Phish Campaign Feb 25 2016;  
22,5842016/02/27 2022567  ET CURRENT_EVENTS Evil Redirect Leading to EK Feb 25 2016;  
22,5832016/02/27 2022568  ET TROJAN Likely PadCrypt Locker PKG DL;  
22,5822016/02/27 2022569  ET TROJAN PadCrypt .onion Payment Domain;  
22,5812016/02/27 2022566  ET CURRENT_EVENTS Possible Malicious Macro EXE DL AlphaNumL;  
22,5802016/02/26 2022564  ET TROJAN Operation Blockbuster User-Agent (Mozillar); [1,2
22,5792016/02/26 2022565  ET CURRENT_EVENTS Evil Redirect Leading to EK Feb 23 2016;  
22,5782016/02/25 2022562  ET MOBILE_MALWARE Backdoor.AndroidOS.Torec.a .onion Proxy Domain;  
22,5772016/02/25 2022563  ET MOBILE_MALWARE Backdoor.AndroidOS.Torec.a .onion Proxy Domain 2;  
22,5762016/02/25 2022561  ET TROJAN TeslaCrypt/AlphaCrypt Variant .onion Payment Domain(xlowfznrg4wf7dli);  
22,5752016/02/24 2022558  ET TROJAN Linux/Tsunami DNS Request (linuxmint.kernel-org.org); [1
22,5742016/02/24 2022559  ET TROJAN FrameworkPOS Covert DNS CnC Initial Check In; [1
22,5732016/02/24 2022560  ET TROJAN Ransomware Locky .onion Payment Domain; [1
22,5722016/02/24 2022557  ET TROJAN Linux/Tsunami DNS Request (eggstrawdinarry.mylittlerepo.com); [1
22,5712016/02/24 2022551  ET POLICY Logmein.com/Join.me SSL Remote Control Access;  
22,5702016/02/24 2022555  ET TROJAN Linux/Tsunami DNS Request (updates.absentvodka.com); [1
22,5692016/02/24 2022556  ET TROJAN Linux/Tsunami DNS Request (updates.mintylinux.com); [1
22,5682016/02/24 2022554  ET EXPLOIT FireEye Detection Evasion %temp% attempt - Inbound; [1
22,5672016/02/24 2022553  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Malware CnC); [1
22,5662016/02/20 2022550  ET CURRENT_EVENTS Possible Malicious Macro DL EXE Feb 2016;  
22,5652016/02/20 2022549  ET CURRENT_EVENTS Dridex DL Pattern Feb 18 2016;  
22,5642016/02/20 2022548  ET TROJAN Ransomware Locky .onion Payment Domain;  
22,5632016/02/20 2022547  ET EXPLOIT Possible CVE-2015-7547 Large Response to A/AAAA query;  
22,5622016/02/20 2022544  ET EXPLOIT Possible CVE-2015-7547 Long Response to AAAA lookup;  
< 91  92  93  94  95  96  97  98  99  100 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.