시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,6612015/01/20 2016527  ET TROJAN W32/Asprox php.dll.crp POST CnC Beacon; [1
13,6602015/01/20 2016526  ET CURRENT_EVENTS Blackhole V2 Exploit Kit Landing Page Try Catch False Specific - 4/3/2013;  
13,6592015/01/20 2016525  ET CURRENT_EVENTS Blackhole V2 Exploit Kit Landing Page Try Catch Body Style 2 Specific - 4/3/2013;  
13,6582015/01/20 2016524  ET CURRENT_EVENTS Blackhole V2 Exploit Kit Landing Page Try Catch Body Specific - 4/3/2013;  
13,6572015/01/20 2016523  ET CURRENT_EVENTS Unknown Exploit Kit Exploit Request;  
13,6562015/01/20 2016522  ET CURRENT_EVENTS Unknown Exploit Kit Payload Request;  
13,6552015/01/20 2016521  ET CURRENT_EVENTS Unknown Exploit Kit Java Archive Request (Java-SPLOIT.jar);  
13,6542015/01/20 2016520  ET CURRENT_EVENTS Probable Sakura exploit kit landing page obfuscated applet tag Mar 1 2013;  
13,6532015/01/20 2016519  ET EXPLOIT Metasploit js_property_spray sprayHeap; [1
13,6522015/01/20 2016516  ET WEB_SERVER WebShell - Generic - c99shell based POST structure;  
13,6512015/01/20 2016515  ET TROJAN Gimemo Activity;  
13,6502015/01/20 2016514  ET CURRENT_EVENTS CrimeBoss - Java Exploit - jhan.jar;  
13,6492015/01/20 2016513  ET MOBILE_MALWARE Android/Smsilence.A Sending SMS Messages CnC Beacon; [1
13,6482015/01/20 2016512  ET MOBILE_MALWARE Android/Smsilence.A Successful Install Report; [1
13,6472015/01/20 2016511  ET CURRENT_EVENTS Successful Compromise svchost.jpg Beacon - Java Zeroday; [1
13,6462015/01/20 2016510  ET INFO Serialized Java Applet (Used by some EKs in the Wild);  
13,6452015/01/20 2016509  ET TROJAN W32/Zbot.Variant Fake MSIE 6.0 UA;  
13,6442015/01/20 2016508  ET TROJAN W32/Caphaw CnC Configuration File Request; [1
13,6432015/01/20 2016507  ET TROJAN W32/Caphaw Requesting Additional Modules From CnC; [1
13,6422015/01/20 2016506  ET CURRENT_EVENTS Exploit Kit Java jpeg download;  
13,6412015/01/20 2016505  ET INFO file possibly containing Serialized Data file;  
13,6402015/01/20 2016504  ET INFO Serialized Data request;  
13,6392015/01/20 2016503  ET INFO Java Serialized Data;  
13,6382015/01/20 2016502  ET INFO Java Serialized Data via vulnerable client;  
13,6372015/01/20 2016501  ET WEB_SERVER WebShell - zecmd - Form;  
13,6362015/01/20 2016500  ET CURRENT_EVENTS Possible Nicepack EK Landing (Anti-VM);  
13,6352015/01/20 2016499  ET CURRENT_EVENTS Styx Exploit Kit Payload Download;  
13,6342015/01/20 2016498  ET CURRENT_EVENTS Styx Exploit Kit Landing Applet With Payload; [1
13,6332015/01/20 2016497  ET CURRENT_EVENTS StyX Landing Page (2);  
13,6322015/01/20 2016496  ET TROJAN Gimemo Ransomware Checkin;  
13,6312015/01/20 2016495  ET CURRENT_EVENTS Exploit Kit Java .psd download;  
13,6302015/01/20 2016494  ET INFO Serialized Java Applet (Used by some EKs in the Wild);  
13,6292015/01/20 2016493  ET CURRENT_EVENTS CoolEK/BHEK/Impact EK Java7 Exploit Class Request (3);  
13,6282015/01/20 2016492  ET CURRENT_EVENTS CoolEK/BHEK/Impact EK Java7 Exploit Class Request (3);  
13,6272015/01/20 2016491  ET CURRENT_EVENTS CoolEK/BHEK/Impact EK Java7 Exploit Class Request (2);  
13,6262015/01/20 2016490  ET CURRENT_EVENTS CoolEK/BHEK/Impact EK Java7 Exploit Class Request (1);  
13,6252015/01/20 2016489  ET TROJAN CBeplay Downloading Design;  
13,6242015/01/20 2016488  ET TROJAN CommentCrew Possible APT c2 communications get command client key;  
13,6232015/01/20 2016487  ET TROJAN CommentCrew Possible APT backdoor download logo.png;  
13,6222015/01/20 2016486  ET TROJAN CommentCrew Possible APT backdoor stage 2 download base64 update.gif;  
13,6212015/01/20 2016485  ET TROJAN CommentCrew Possible APT crabdance backdoor base64 head;  
13,6202015/01/20 2016484  ET TROJAN CommentCrew Possible APT crabdance backdoor base64 head 2;  
13,6192015/01/20 2016483  ET TROJAN CommentCrew Possible APT c2 communications download client.png;  
13,6182015/01/20 2016482  ET TROJAN CommentCrew Possible APT c2 communications sleep5;  
13,6172015/01/20 2016480  ET TROJAN CommentCrew Possible APT c2 communications sleep3;  
13,6162015/01/20 2016479  ET TROJAN CommentCrew Possible APT c2 communications sleep2;  
13,6152015/01/20 2016478  ET TROJAN CommentCrew Possible APT c2 communications sleep;  
13,6142015/01/20 2016477  ET TROJAN CommentCrew Possible APT c2 communications html return 1;  
13,6132015/01/20 2016476  ET TROJAN CommentCrew Possible APT c2 communications get system;  
13,6122015/01/20 2016475  ET TROJAN CommentCrew downloader without user-agent string exe download without User Agent;  
< 261  262  263  264  265  266  267  268  269  270 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.