시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
15,5112015/01/20 2018430  ET WEB_CLIENT SUSPICOUS Possible automated connectivity check (www.google.com);  
15,5102015/01/20 2018428  ET CURRENT_EVENTS SUSPICIOUS Crystalize Filter in Uncompressed Flash; [1
15,5092015/01/20 2018427  ET TROJAN Netwire RAT Check-in; [1
15,5082015/01/20 2018426  ET TROJAN Netwire RAT Check-in; [1
15,5072015/01/20 2018425  ET TROJAN Vawtrak/NeverQuest - Post Data Form 01;  
15,5062015/01/20 2018424  ET DELETED W32/MadnessPro.DDOSBot CnC Beacon; [1
15,5052015/01/20 2018423  ET TROJAN W32/Eclipse.DDOSBot CnC Beacon Response; [1
15,5042015/01/20 2018422  ET TROJAN Upatre Binary Download April 28 2014;  
15,5032015/01/20 2018421  ET TROJAN Zbot downloader Installing Zeus;  
15,5022015/01/20 2018420  ET TROJAN hacker87 checkin;  
15,5012015/01/20 2018419  ET TROJAN W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA;  
15,5002015/01/20 2018418  ET CURRENT_EVENTS Possible W32/Zbot.InfoStealer SSL Cert Parallels.com;  
15,4992015/01/20 2018417  ET TROJAN ftpchk3.php possible upload success; [1,2
15,4982015/01/20 2018416  ET TROJAN ftpchk3.php upload attempted; [1,2
15,4972015/01/20 2018415  ET TROJAN W32/Tepfer.InfoStealer CnC Beacon;  
15,4962015/01/20 2018413  ET TROJAN Probable OneLouder downloader (Zeus P2P);  
15,4952015/01/20 2018412  ET TROJAN Trojan-Spy.Win32.Zbot.qgxi Checkin; [1
15,4942015/01/20 2018411  ET CURRENT_EVENTS Fiesta Flash Exploit Download;  
15,4932015/01/20 2018410  ET CURRENT_EVENTS Fiesta Flash Exploit Download;  
15,4922015/01/20 2018409  ET CURRENT_EVENTS Fiesta SilverLight Exploit Download;  
15,4912015/01/20 2018408  ET CURRENT_EVENTS Fiesta PDF Exploit Download;  
15,4902015/01/20 2018407  ET CURRENT_EVENTS Fiesta URI Struct;  
15,4892015/01/20 2018406  ET POLICY Possible Grams DarkMarket Search DNS Domain Lookup;  
15,4882015/01/20 2018405  ET CURRENT_EVENTS DRIVEBY EL8 EK Landing;  
15,4872015/01/20 2018404  ET TROJAN GreenDou Downloader User-Agent (hello crazyk);  
15,4862015/01/20 2018403  ET TROJAN GENERIC Likely Malicious Fake IE Downloading .exe;  
15,4852015/01/20 2018402  ET CURRENT_EVENTS DRIVEBY Possible Goon/Infinity EK SilverLight Exploit;  
15,4842015/01/20 2018401  ET TROJAN Win32.Kazy Checkin;  
15,4832015/01/20 2018400  ET TROJAN BitCrypt Ransomware Domain;  
15,4822015/01/20 2018399  ET TROJAN BitCrypt site accessed via .onion SSL Proxy;  
15,4812015/01/20 2018397  ET TROJAN CryptoDefense DNS Domain Lookup;  
15,4802015/01/20 2018396  ET CURRENT_EVENTS BrowseTor .onion Proxy Service SSL Cert;  
15,4792015/01/20 2018395  ET TROJAN Possible Kelihos.F EXE Download Common Structure 2;  
15,4782015/01/20 2018394  ET TROJAN Common Upatre Header Structure;  
15,4772015/01/20 2018393  ET TROJAN plasmabot Checkin; [1
15,4762015/01/20 2018392  ET ATTACK_RESPONSE Possible MS CMD Shell opened on local system 2; [1
15,4752015/01/20 2018390  ET TROJAN Backdoor Win32/Zegost.Q CnC traffic (OUTBOUND); [1,2
15,4742015/01/20 2018389  ET CURRENT_EVENTS Possible TLS HeartBleed Unencrypted Request Method 3 (Inbound to Common SSL Port); [1,2,3
15,4732015/01/20 2018388  ET CURRENT_EVENTS Possible TLS HeartBleed Unencrypted Request Method 4 (Inbound to Common SSL Port); [1,2,3
15,4722015/01/20 2018387  ET CURRENT_EVENTS Angler EK Landing Apr 14 2014;  
15,4712015/01/20 2018386  ET TROJAN cryptodefense Checkin;  
15,4702015/01/20 2018385  ET TROJAN Zeus.Downloader Campaign Second Stage Executable Request 10/4/2014;  
15,4692015/01/20 2018384  ET TROJAN Zeus.Downloader Campaign Unknown Initial CnC Beacon 10/4/2014;  
15,4682015/01/20 2018383  ET CURRENT_EVENTS Possible OpenSSL HeartBleed Large HeartBeat Response from Common SSL Port (Outbound from Client); [1,2,3
15,4672015/01/20 2018382  ET CURRENT_EVENTS Possible OpenSSL HeartBleed Large HeartBeat Response from Common SSL Port (Outbound from Server); [1,2,3
15,4662015/01/20 2018381  ET TROJAN Suspicious User-Agent (hi);  
15,4652015/01/20 2018380  ET TROJAN Backdoor.Win32.Mecklow.A Checkin 2; [1,2
15,4642015/01/20 2018379  ET TROJAN Backdoor.Win32.Mecklow.A Checkin; [1,2
15,4632015/01/20 2018378  ET CURRENT_EVENTS Possible OpenSSL HeartBleed Large HeartBeat Response (Server Init Vuln Client); [1,2,3
15,4622015/01/20 2018377  ET CURRENT_EVENTS Possible OpenSSL HeartBleed Large HeartBeat Response (Client Init Vuln Server); [1,2,3
< 231  232  233  234  235  236  237  238  239  240 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.