번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
15,211 | 2015/01/20 | 2018117 | ET TROJAN Possible Sinkhole banner; [1] |
15,210 | 2015/01/20 | 2018116 | ET TROJAN MS Remote Desktop edc User Login Request; [1] |
15,209 | 2015/01/20 | 2018115 | ET TROJAN FTP File Upload - BlackPOS Naming Scheme; [1] |
15,208 | 2015/01/20 | 2018114 | ET TROJAN DNS Query for Known Chewbacca CnC Server; [1,2] |
15,207 | 2015/01/20 | 2018113 | ET WEB_SERVER Apache Tomcat Boundary Overflow DOS/File Upload Attempt; [1] |
15,206 | 2015/01/20 | 2018112 | ET TROJAN Trojan/Win32.FraudPack User-Agent (Downloader MLR 1.0.0); |
15,205 | 2015/01/20 | 2018111 | ET DELETED Win32.Sality.bh Checkin; |
15,204 | 2015/01/20 | 2018110 | ET TROJAN Win32.Blackbeard Downloader; [1] |
15,203 | 2015/01/20 | 2018109 | ET TROJAN vSkimmer.PoS Checkin; [1] |
15,202 | 2015/01/20 | 2018108 | ET TROJAN Infostealer.Jackpos Checkin; [1] |
15,201 | 2015/01/20 | 2018107 | ET WEB_SPECIFIC_APPS JoomSocial AvatarUpload RCE; [1] |
15,200 | 2015/01/20 | 2018106 | ET CURRENT_EVENTS Suspicious Jar name JavaUpdate.jar; [1] |
15,199 | 2015/01/20 | 2018105 | ET TROJAN Possible Mask C2 Traffic; [1] |
15,198 | 2015/01/20 | 2018104 | ET CURRENT_EVENTS EXE Accessing Kaspersky System Driver (Possible Mask); [1] |
15,197 | 2015/01/20 | 2018103 | ET CURRENT_EVENTS TecSystems (Possible Mask) Signed PE EXE Download; [1] |
15,196 | 2015/01/20 | 2018102 | ET TROJAN W32/Woai.Dropper Config Request; |
15,195 | 2015/01/20 | 2018101 | ET TROJAN W32/Dinwod.Dropper CnC Beacon; |
15,194 | 2015/01/20 | 2018100 | ET TROJAN W32/Rshot.Backdoor File Upload CnC Beacon; |
15,193 | 2015/01/20 | 2018099 | ET MALWARE W32/Safekeeper.Adware CnC Beacon; |
15,192 | 2015/01/20 | 2018098 | ET TROJAN W32/Asprox.ClickFraudBot POST CnC Beacon; [1,2] |
15,191 | 2015/01/20 | 2018097 | ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon Acknowledgement; [1,2] |
15,190 | 2015/01/20 | 2018096 | ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon; [1,2] |
15,189 | 2015/01/20 | 2018095 | ET MALWARE Potentially Unwanted Application AirInstaller; |
15,188 | 2015/01/20 | 2018094 | ET TROJAN DirtJumper Activity; |
15,187 | 2015/01/20 | 2018093 | ET WEB_SERVER Oracle Reports Parse Query Returned Creds CVE-2012-3153; [1] |
15,186 | 2015/01/20 | 2018092 | ET WEB_SERVER Possible Oracle Reports Forms RCE CVE-2012-3152; [1] |
15,185 | 2015/01/20 | 2018091 | ET CURRENT_EVENTS Possible Flash Exploit CVE-2014-0497; [1] |
15,184 | 2015/01/20 | 2018090 | ET WEB_CLIENT Possible BeEF Module in use; |
15,183 | 2015/01/20 | 2018089 | ET WEB_CLIENT Possible BeEF Default SSL Cert; |
15,182 | 2015/01/20 | 2018088 | ET WEB_CLIENT BeEF Cookie Outbound; [1] |
15,181 | 2015/01/20 | 2018087 | ET INFO Control Panel Applet File Download; [1,2] |
15,180 | 2015/01/20 | 2018086 | ET CURRENT_EVENTS Possible malicious zipped-executable; |
15,179 | 2015/01/20 | 2018085 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 26; [1,2] |
15,178 | 2015/01/20 | 2018084 | ET MALWARE Suspicious User-Agent (gettingAnswer); |
15,177 | 2015/01/20 | 2018083 | ET TROJAN W32/Zeus.InfoStealer Infection Campaign Heap.exe Request; |
15,176 | 2015/01/20 | 2018082 | ET TROJAN W32/Zeus.InfoStealer Infection Campaign Wav.exe Request; |
15,175 | 2015/01/20 | 2018081 | ET TROJAN W32/Zeus.InfoStealer Infection Campaign Kia.exe Request; |
15,174 | 2015/01/20 | 2018080 | ET TROJAN W32/Zeus.InfoStealer Infection Campaign Pdf.exe Request; |
15,173 | 2015/01/20 | 2018079 | ET TROJAN W32.Blackshades/Shadesrat Backdoor CnC Beacon; |
15,172 | 2015/01/20 | 2018078 | ET TROJAN W32/Kbot.Backdoor Variant CnC Beacon; |
15,171 | 2015/01/20 | 2018077 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 25; [1,2] |
15,170 | 2015/01/20 | 2018076 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 24; [1,2] |
15,169 | 2015/01/20 | 2018075 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 23; [1,2] |
15,168 | 2015/01/20 | 2018074 | ET TROJAN Win32/StoredBt.A Activity; |
15,167 | 2015/01/20 | 2018073 | ET TROJAN W32/FakeAlert.FT.gen.Eldorado Downloading VBS; |
15,166 | 2015/01/20 | 2018072 | ET TROJAN W32/FakeAlert.FT.gen.Eldorado Downloading DLL; |
15,165 | 2015/01/20 | 2018071 | ET MOBILE_MALWARE Android/DwnlAPK-A Configuration File Request; [1] |
15,164 | 2015/01/20 | 2018069 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 22; [1,2] |
15,163 | 2015/01/20 | 2018068 | ET TROJAN Possible KAPTOXA Encoded Data Transferred Over SMB 10; [1] |
15,162 | 2015/01/20 | 2018067 | ET TROJAN Possible KAPTOXA Encoded Data Transferred Over SMB 9; [1] |
< 231 232 233 234 235 236 237 238 239 240 > |