시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
15,2112015/01/20 2018117  ET TROJAN Possible Sinkhole banner; [1
15,2102015/01/20 2018116  ET TROJAN MS Remote Desktop edc User Login Request; [1
15,2092015/01/20 2018115  ET TROJAN FTP File Upload - BlackPOS Naming Scheme; [1
15,2082015/01/20 2018114  ET TROJAN DNS Query for Known Chewbacca CnC Server; [1,2
15,2072015/01/20 2018113  ET WEB_SERVER Apache Tomcat Boundary Overflow DOS/File Upload Attempt; [1
15,2062015/01/20 2018112  ET TROJAN Trojan/Win32.FraudPack User-Agent (Downloader MLR 1.0.0);  
15,2052015/01/20 2018111  ET DELETED Win32.Sality.bh Checkin;  
15,2042015/01/20 2018110  ET TROJAN Win32.Blackbeard Downloader; [1
15,2032015/01/20 2018109  ET TROJAN vSkimmer.PoS Checkin; [1
15,2022015/01/20 2018108  ET TROJAN Infostealer.Jackpos Checkin; [1
15,2012015/01/20 2018107  ET WEB_SPECIFIC_APPS JoomSocial AvatarUpload RCE; [1
15,2002015/01/20 2018106  ET CURRENT_EVENTS Suspicious Jar name JavaUpdate.jar; [1
15,1992015/01/20 2018105  ET TROJAN Possible Mask C2 Traffic; [1
15,1982015/01/20 2018104  ET CURRENT_EVENTS EXE Accessing Kaspersky System Driver (Possible Mask); [1
15,1972015/01/20 2018103  ET CURRENT_EVENTS TecSystems (Possible Mask) Signed PE EXE Download; [1
15,1962015/01/20 2018102  ET TROJAN W32/Woai.Dropper Config Request;  
15,1952015/01/20 2018101  ET TROJAN W32/Dinwod.Dropper CnC Beacon;  
15,1942015/01/20 2018100  ET TROJAN W32/Rshot.Backdoor File Upload CnC Beacon;  
15,1932015/01/20 2018099  ET MALWARE W32/Safekeeper.Adware CnC Beacon;  
15,1922015/01/20 2018098  ET TROJAN W32/Asprox.ClickFraudBot POST CnC Beacon; [1,2
15,1912015/01/20 2018097  ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon Acknowledgement; [1,2
15,1902015/01/20 2018096  ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon; [1,2
15,1892015/01/20 2018095  ET MALWARE Potentially Unwanted Application AirInstaller;  
15,1882015/01/20 2018094  ET TROJAN DirtJumper Activity;  
15,1872015/01/20 2018093  ET WEB_SERVER Oracle Reports Parse Query Returned Creds CVE-2012-3153; [1
15,1862015/01/20 2018092  ET WEB_SERVER Possible Oracle Reports Forms RCE CVE-2012-3152; [1
15,1852015/01/20 2018091  ET CURRENT_EVENTS Possible Flash Exploit CVE-2014-0497; [1
15,1842015/01/20 2018090  ET WEB_CLIENT Possible BeEF Module in use;  
15,1832015/01/20 2018089  ET WEB_CLIENT Possible BeEF Default SSL Cert;  
15,1822015/01/20 2018088  ET WEB_CLIENT BeEF Cookie Outbound; [1
15,1812015/01/20 2018087  ET INFO Control Panel Applet File Download; [1,2
15,1802015/01/20 2018086  ET CURRENT_EVENTS Possible malicious zipped-executable;  
15,1792015/01/20 2018085  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 26; [1,2
15,1782015/01/20 2018084  ET MALWARE Suspicious User-Agent (gettingAnswer);  
15,1772015/01/20 2018083  ET TROJAN W32/Zeus.InfoStealer Infection Campaign Heap.exe Request;  
15,1762015/01/20 2018082  ET TROJAN W32/Zeus.InfoStealer Infection Campaign Wav.exe Request;  
15,1752015/01/20 2018081  ET TROJAN W32/Zeus.InfoStealer Infection Campaign Kia.exe Request;  
15,1742015/01/20 2018080  ET TROJAN W32/Zeus.InfoStealer Infection Campaign Pdf.exe Request;  
15,1732015/01/20 2018079  ET TROJAN W32.Blackshades/Shadesrat Backdoor CnC Beacon;  
15,1722015/01/20 2018078  ET TROJAN W32/Kbot.Backdoor Variant CnC Beacon;  
15,1712015/01/20 2018077  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 25; [1,2
15,1702015/01/20 2018076  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 24; [1,2
15,1692015/01/20 2018075  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 23; [1,2
15,1682015/01/20 2018074  ET TROJAN Win32/StoredBt.A Activity;  
15,1672015/01/20 2018073  ET TROJAN W32/FakeAlert.FT.gen.Eldorado Downloading VBS;  
15,1662015/01/20 2018072  ET TROJAN W32/FakeAlert.FT.gen.Eldorado Downloading DLL;  
15,1652015/01/20 2018071  ET MOBILE_MALWARE Android/DwnlAPK-A Configuration File Request; [1
15,1642015/01/20 2018069  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 22; [1,2
15,1632015/01/20 2018068  ET TROJAN Possible KAPTOXA Encoded Data Transferred Over SMB 10; [1
15,1622015/01/20 2018067  ET TROJAN Possible KAPTOXA Encoded Data Transferred Over SMB 9; [1
< 231  232  233  234  235  236  237  238  239  240 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.