시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
6,0112015/01/20 2008087  ET TROJAN Downloader.VB.CEJ HTTP Checkin; [1
6,0102015/01/20 2008086  ET TROJAN Daemonize.ft HTTP Checkin; [1
6,0092015/01/20 2008085  ET MALWARE Alexa Search Toolbar User-Agent 2 (Alexa Toolbar); [1
6,0082015/01/20 2008084  ET TROJAN Suspicious User-Agent (Mozilla-web); [1
6,0072015/01/20 2008083  ET DELETED Suspicious User Agent (Zlob Related) (UA00000); [1
6,0062015/01/20 2008082  ET TROJAN Vundo HTTP Post-Install Checkin (2); [1
6,0052015/01/20 2008081  ET DELETED Xorer.ez HTTP Checkin to CnC; [1
6,0042015/01/20 2008076  ET DELETED General Downloader URL Pattern (/loader/setup.php); [1
6,0032015/01/20 2008074  ET TROJAN Banload User-Agent Detected (WebUpdate); [1
6,0022015/01/20 2008073  ET TROJAN Suspicious User-Agent (App4); [1
6,0012015/01/20 2008071  ET TROJAN Delf Checkin via HTTP (6); [1
6,0002015/01/20 2008070  ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System (Win98); [1
5,9992015/01/20 2008069  ET MALWARE Kwsearchguide.com Related Spyware Keepalive; [1
5,9982015/01/20 2008067  ET MALWARE Kwsearchguide.com Related Spyware Checkin; [1
5,9972015/01/20 2008066  ET MALWARE Blank User-Agent (descriptor but no string); [1
5,9962015/01/20 2008065  ET DELETED Nginx Server with modified version string - Often Hostile Traffic; [1
5,9952015/01/20 2008064  ET DELETED Nginx Server with no version string - Often Hostile Traffic; [1
5,9942015/01/20 2008063  ET EXPLOIT MDAEMON (Post Auth) Remote Root IMAP FETCH Command Universal Exploit; [1,2
5,9932015/01/20 2008062  ET ACTIVEX Universal HTTP File Upload Remote File Deletetion; [1,2
5,9922015/01/20 2008061  ET DELETED LDPinch Checkin (4); [1
5,9912015/01/20 2008060  ET TROJAN Win32.Inject.ajq Initial Checkin to CnC Response port 443; [1
5,9902015/01/20 2008059  ET DELETED Win32.Inject.ajq Initial Checkin to CnC packet 2 port 443; [1
5,9892015/01/20 2008058  ET TROJAN Win32.Inject.ajq Initial Checkin to CnC port 443; [1
5,9882015/01/20 2008057  ET TROJAN Win32.Inject.ajq Initial Checkin to CnC Response; [1
5,9872015/01/20 2008056  ET TROJAN Win32.Inject.ajq Initial Checkin to CnC packet 2; [1
5,9862015/01/20 2008055  ET TROJAN Win32.Inject.ajq Initial Checkin to CnC; [1
5,9852015/01/20 2008054  ET DELETED Nginx Server in use - Often Hostile Traffic; [1
5,9842015/01/20 2008052  ET MALWARE User-Agent (Internet Explorer); [1
5,9832015/01/20 2008051  ET POLICY Dell MyWay Remote control agent; [1
5,9822015/01/20 2008049  ET TROJAN Yahoo550.com Related Downloader/Trojan Checkin; [1
5,9812015/01/20 2008048  ET TROJAN Suspicious User-Agent (Version 1.23); [1
5,9802015/01/20 2008047  ET TROJAN Egspy Infection Report via HTTP; [1,2
5,9792015/01/20 2008046  ET TROJAN Rf-cheats.ru Trojan Related User-Agent (RFRudokop v.1.1 account verification); [1
5,9782015/01/20 2008044  ET TROJAN Delf Checkin via HTTP (5); [1
5,9772015/01/20 2008043  ET TROJAN Suspicious User-Agent (c \windows); [1
5,9762015/01/20 2008042  ET TROJAN Hupigon CnC Data Post (variant abb); [1
5,9752015/01/20 2008041  ET DELETED Hupigon CnC init (variant abb); [1
5,9742015/01/20 2008040  ET MALWARE Privacyprotector Related Spyware User-Agent (Ssol NetInstaller); [1
5,9732015/01/20 2008039  ET TROJAN Egspy Infection Report Email; [1,2
5,9722015/01/20 2008038  ET MALWARE User-Agent (Mozilla/4.0 (compatible ICS)); [1
5,9712015/01/20 2008037  ET POLICY Gteko User-Agent Detected - Dell Remote Access; [1
5,9702015/01/20 2008036  ET DELETED 360safe.com related Fake Security Product Update; [1
5,9692015/01/20 2008035  ET DELETED System.Poser HTTP Checkin; [1
5,9682015/01/20 2008034  ET TROJAN LDPinch SMTP Password Report; [1
5,9672015/01/20 2008033  ET DELETED Banker.maf SMTP Checkin (Not in the Control...); [1
5,9662015/01/20 2008032  ET TROJAN Dorf/Win32.Inject.adt C&C Communication Inbound; [1
5,9652015/01/20 2008031  ET TROJAN Dorf/Win32.Inject.adt C&C Communication Outbound; [1
5,9642015/01/20 2008030  ET TROJAN Turkojan C&C nxt Command Response (nxt); [1
5,9632015/01/20 2008029  ET TROJAN Turkojan C&C nxt Command (nxt); [1
5,9622015/01/20 2008028  ET TROJAN Turkojan C&C Browse Drive Command Response (metin); [1
< 421  422  423  424  425  426  427  428  429  430 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.