번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
20,761 | 2015/03/29 | 2020765 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 64; [1] |
20,760 | 2015/03/29 | 2020766 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 65; [1] |
20,759 | 2015/03/29 | 2020764 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 63; [1] |
20,758 | 2015/03/29 | 2020763 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 62; [1] |
20,757 | 2015/03/28 | 2020762 | ET TROJAN Vawtrak/NeverQuest .onion Proxy Domain (llgerw4plyyff446); [1] |
20,756 | 2015/03/28 | 2020761 | ET TROJAN Vawtrak/NeverQuest .onion Proxy Domain (bc3ywvif4m3lnw4o); [1] |
20,755 | 2015/03/28 | 2020760 | ET TROJAN Vawtrak/NeverQuest .onion Proxy Domain (4bpthx5z4e7n6gnb); [1] |
20,754 | 2015/03/28 | 2020758 | ET CURRENT_EVENTS VBA Office Document Dridex Binary Download User-Agent; |
20,753 | 2015/03/28 | 2020759 | ET TROJAN Vawtrak/NeverQuest .onion Proxy Domain (otsaa35gxbcwvrqs); [1] |
20,752 | 2015/03/28 | 2020757 | ET MALWARE Windows executable sent when remote host claims to send an image 2; |
20,751 | 2015/03/27 | 2020756 | ET WEB_CLIENT Firefox Proxy Prototype RCE Attempt (CVE-2014-8636); [1] |
20,750 | 2015/03/27 | 2020753 | ET EXPLOIT Metasploit Plugin-Detect Posting Data 6; [1] |
20,749 | 2015/03/27 | 2020754 | ET EXPLOIT Metasploit Plugin-Detect Posting Data 7; [1] |
20,748 | 2015/03/27 | 2020752 | ET EXPLOIT Metasploit Plugin-Detect Posting Data 5; [1] |
20,747 | 2015/03/27 | 2020751 | ET EXPLOIT Metasploit Plugin-Detect Posting Data 4; [1] |
20,746 | 2015/03/27 | 2020755 | ET EXPLOIT Metasploit Browser Exploit Server Plugin Detect 2; |
20,745 | 2015/03/27 | 2020746 | ET TROJAN Win32.Chroject.B Retrieving encoded payload; |
20,744 | 2015/03/27 | 2020749 | ET TROJAN Win32.Chroject.B Receiving ClickFraud Commands from CnC 2; |
20,743 | 2015/03/27 | 2020747 | ET TROJAN Win32.Chroject.B Requesting ClickFraud Commands from CnC; |
20,742 | 2015/03/27 | 2020748 | ET TROJAN Win32.Chroject.B Receiving ClickFraud Commands from CnC 1; |
20,741 | 2015/03/27 | 2020750 | ET TROJAN Win32.Chroject.B ClickFraud Request; |
20,740 | 2015/03/27 | 2020745 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1] |
20,739 | 2015/03/26 | 2020742 | ET TROJAN Win32.Hyteod.acox Domain Generation Algorithm (DGA) Lookup NXDOMAIN Response; |
20,738 | 2015/03/26 | 2020744 | ET CURRENT_EVENTS HanJuan EK Landing March 24 2015 M2; |
20,737 | 2015/03/26 | 2020743 | ET CURRENT_EVENTS HanJuan EK Landing March 24 2015 M1; |
20,736 | 2015/03/26 | 2020741 | ET TROJAN Win32.Hyteod.acox Domain Generation Algorithm (DGA) Lookup NXDOMAIN Response; |
20,735 | 2015/03/26 | 2020740 | ET TROJAN CryptoLocker .onion Proxy Domain (iezqmd4s2fflmh7n); |
20,734 | 2015/03/26 | 2020738 | ET TROJAN Win32/TrojanProxy.JpiProx.B CnC Beacon 2; |
20,733 | 2015/03/26 | 2020739 | ET TROJAN Unknown Trojan DNS Query to .onion proxy Domain (l7gbml27czk3kvr5); |
20,732 | 2015/03/26 | 2020736 | ET CURRENT_EVENTS Unauthorized SSL Cert for Google Domains; [1] |
20,731 | 2015/03/26 | 2020737 | ET TROJAN Win32/TrojanProxy.JpiProx.B CnC Beacon 1; |
20,730 | 2015/03/26 | 2020734 | ET TROJAN Fileless infection dropped by EK CnC Beacon; |
20,729 | 2015/03/26 | 2020735 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Ransomware CnC); [1] |
20,728 | 2015/03/25 | 2020733 | ET WEB_SPECIFIC_APPS Possible Netscaler SQLi bypass (cookie); [1] |
20,727 | 2015/03/25 | 2020732 | ET WEB_SPECIFIC_APPS Possible Netscaler SQLi bypass (POST data); [1] |
20,726 | 2015/03/25 | 2020730 | ET CURRENT_EVENTS Angler EK XTEA encrypted binary (22); |
20,725 | 2015/03/25 | 2020731 | ET WEB_SPECIFIC_APPS Possible Netscaler SQLi bypass (URI data); [1] |
20,724 | 2015/03/25 | 2020727 | ET TROJAN Zbot .onion Proxy Domain (3bjpwsf3fjcwtnwx); |
20,723 | 2015/03/25 | 2020728 | ET TROJAN Possible Adwind SSL Cert (assylias.Inc); |
20,722 | 2015/03/25 | 2020729 | ET MOBILE_MALWARE Android.Trojan.SMSSend.Y; |
20,721 | 2015/03/25 | 2020726 | ET CURRENT_EVENTS RIG EK Landing March 20 2015 M2; |
20,720 | 2015/03/22 | 2020724 | ET TROJAN KeyLogger related to FindPOS CnC Beacon; [1,2] |
20,719 | 2015/03/22 | 2020725 | ET CURRENT_EVENTS RIG EK Landing March 20 2015; |
20,718 | 2015/03/22 | 2020723 | ET TROJAN FindPOS Checkin; |
20,717 | 2015/03/22 | 2020722 | ET CURRENT_EVENTS RIG Landing URI Struct March 20 2015; |
20,716 | 2015/03/22 | 2020719 | ET CURRENT_EVENTS Possible HanJuan Landing March 20 2015; |
20,715 | 2015/03/22 | 2020717 | ET TROJAN Win32/Teslacrypt Ransomware HTTP CnC Beacon M1; |
20,714 | 2015/03/22 | 2020718 | ET TROJAN Win32/Teslacrypt Ransomware HTTP CnC Beacon M2; |
20,713 | 2015/03/22 | 2020720 | ET CURRENT_EVENTS RIG Payload URI Struct March 20 2015; |
20,712 | 2015/03/22 | 2020721 | ET CURRENT_EVENTS RIG Exploit URI Struct March 20 2015; |
< 121 122 123 124 125 126 127 128 129 130 > |