번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
23,161 | 2016/07/07 | 2403430 | ET CINS Active Threat Intelligence Poor Reputation IP group 131; [1,2] |
23,160 | 2016/07/07 | 2403435 | ET CINS Active Threat Intelligence Poor Reputation IP group 136; [1,2] |
23,159 | 2016/07/07 | 2022951 | ET TROJAN OSX/Keydnap DNS Query to CnC; [1] |
23,158 | 2016/07/07 | 2022949 | ET CURRENT_EVENTS RIG EK Payload Jul 05 2016; |
23,157 | 2016/07/07 | 2022952 | ET TROJAN Ransomware Locky CnC Beacon 21 May; |
23,156 | 2016/07/07 | 2403429 | ET CINS Active Threat Intelligence Poor Reputation IP group 130; [1,2] |
23,155 | 2016/07/07 | 2022950 | ET TROJAN OSX/Keydnap DNS Query to CnC; [1] |
23,154 | 2016/07/07 | 2022948 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Malware C2); [1] |
23,153 | 2016/07/07 | 2022945 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Rockloader); [1] |
23,152 | 2016/07/07 | 2022947 | ET TROJAN BartCrypt Payment DNS Query to .onion proxy Domain (khh5cmzh5q7yp7th); |
23,151 | 2016/07/07 | 2022946 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Zeus C2); [1] |
23,150 | 2016/07/07 | 2022943 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gootkit C2); [1] |
23,149 | 2016/07/07 | 2022944 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Malware C2); [1] |
23,148 | 2016/07/03 | 2022942 | ET CURRENT_EVENTS Possible Malicous Macro DL EXE Jul 01 2016 (exe generic custom headers); |
23,147 | 2016/07/03 | 2022941 | ET CURRENT_EVENTS Possible Malicous Macro DL EXE Jul 01 2016 (dll generic custom headers); |
23,146 | 2016/07/03 | 2022940 | ET CURRENT_EVENTS Possible Malicous Macro DL EXE Jul 01 2016 (userdir dotted quad); |
23,145 | 2016/07/03 | 2022939 | ET CURRENT_EVENTS Possible Malicous Macro DL EXE Jul 01 2016 (pm); |
23,144 | 2016/07/03 | 2020577 | ET POLICY DNS Query to .onion proxy Domain (onion.direct); [1] |
23,143 | 2016/07/03 | 2020574 | ET POLICY DNS Query to .onion proxy Domain (onion.glass); [1] |
23,142 | 2016/07/03 | 2020211 | ET POLICY DNS Query to .onion proxy Domain (onion.gq); [1] |
23,141 | 2016/07/02 | 2022936 | ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M4; [1] |
23,140 | 2016/07/02 | 2022937 | ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M3; [1] |
23,139 | 2016/07/02 | 2022938 | ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toserver M4; [1] |
23,138 | 2016/07/02 | 2022935 | ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toserver M3; [1] |
23,137 | 2016/07/02 | 2022932 | ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M2; [1] |
23,136 | 2016/07/02 | 2022933 | ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M1; [1] |
23,135 | 2016/07/02 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow; [1] |
23,134 | 2016/07/02 | 2022929 | ET TROJAN Win32/Satana Ransomware Checkin; [1] |
23,133 | 2016/07/01 | 2022928 | ET CURRENT_EVENTS Tech Support Phone Scam Landing Jun 29 M4; |
23,132 | 2016/07/01 | 2022927 | ET CURRENT_EVENTS Tech Support Phone Scam Landing Jun 29 M3; |
23,131 | 2016/07/01 | 2022926 | ET CURRENT_EVENTS Tech Support Phone Scam Landing Jun 29 M2; |
23,130 | 2016/07/01 | 2022925 | ET CURRENT_EVENTS Tech Support Phone Scam Landing Jun 29 M1; |
23,129 | 2016/07/01 | 2022923 | ET EXPLOIT Possible CVE-2016-2209 Symantec PowerPoint Parsing Buffer Overflow M1; [1] |
23,128 | 2016/07/01 | 2022924 | ET EXPLOIT Possible CVE-2016-2209 Symantec PowerPoint Parsing Buffer Overflow M2; [1] |
23,127 | 2016/06/28 | 2403425 | ET CINS Active Threat Intelligence Poor Reputation IP group 126; [1,2] |
23,126 | 2016/06/28 | 2403427 | ET CINS Active Threat Intelligence Poor Reputation IP group 128; [1,2] |
23,125 | 2016/06/28 | 2403428 | ET CINS Active Threat Intelligence Poor Reputation IP group 129; [1,2] |
23,124 | 2016/06/28 | 2403426 | ET CINS Active Threat Intelligence Poor Reputation IP group 127; [1,2] |
23,123 | 2016/06/28 | 2022921 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Malware C2); [1] |
23,122 | 2016/06/28 | 2022922 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (H1N1 C2); [1] |
23,121 | 2016/06/28 | 2022919 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Malware C2); [1] |
23,120 | 2016/06/28 | 2022920 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gootkit C2); [1] |
23,119 | 2016/06/28 | 2022917 | ET TROJAN Ransomware Locky .onion Payment Domain (mphtadhci5mrdlju); |
23,118 | 2016/06/28 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain; |
23,117 | 2016/06/27 | 2403421 | ET CINS Active Threat Intelligence Poor Reputation IP group 122; [1,2] |
23,116 | 2016/06/27 | 2403422 | ET CINS Active Threat Intelligence Poor Reputation IP group 123; [1,2] |
23,115 | 2016/06/27 | 2403423 | ET CINS Active Threat Intelligence Poor Reputation IP group 124; [1,2] |
23,114 | 2016/06/27 | 2403424 | ET CINS Active Threat Intelligence Poor Reputation IP group 125; [1,2] |
23,113 | 2016/06/27 | 2022916 | ET CURRENT_EVENTS RIG EK Payload Jun 26 2016; |
23,112 | 2016/06/25 | 2403420 | ET CINS Active Threat Intelligence Poor Reputation IP group 121; [1,2] |
< 71 72 73 74 75 76 77 78 79 80 > |