시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
11,4112015/01/20 2014183  ET MALWARE Malicious ad_track.php file Reporting;  
11,4102015/01/20 2014182  ET DELETED Malicious getpvstat.php file Reporting;  
11,4092015/01/20 2014181  ET DELETED Malicious file BaiduPlayer1.0.21.25.exe download;  
11,4082015/01/20 2014180  ET WEB_SPECIFIC_APPS SAPID get_infochannel.inc.php Remote File inclusion Attempt; [1
11,4072015/01/20 2014179  ET WEB_SPECIFIC_APPS Joomla mod_currencyconverter from Cross Site Scripting Attempt; [1
11,4062015/01/20 2014178  ET DELETED Unknown Malware Checkin Possibly ZeuS; [1
11,4052015/01/20 2014177  ET DELETED Incognito/Sakura exploit kit binary download request;  
11,4042015/01/20 2014176  ET DELETED Incognito/Sakura exploit kit landing page with obfuscated URLs;  
11,4032015/01/20 2014175  ET TROJAN Win32.MSUpdater C&C traffic GET; [1,2,3
11,4022015/01/20 2014174  ET TROJAN Win32/Cryptrun.B/MSUpdater C&C traffic 1; [1,2,3,4
11,4012015/01/20 2014173  ET TROJAN Win32/Cryptrun.B Connectivity check; [1
11,4002015/01/20 2014172  ET TROJAN TROJAN ClickCounter Connectivity Check;  
11,3992015/01/20 2014171  ET CURRENT_EVENTS Styx Exploit Kit Landing;  
11,3982015/01/20 2014170  ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related; [1
11,3972015/01/20 2014169  ET POLICY DNS Query for .su TLD (Soviet Union) Often Malware Related; [1
11,3962015/01/20 2014168  ET CURRENT_EVENTS DRIVEBY Unknown Landing Page Received;  
11,3952015/01/20 2014167  ET TROJAN W32/Mentory CnC Server Providing File Info Details;  
11,3942015/01/20 2014166  ET TROJAN W32/Mentory CnC Server Providing Update Details;  
11,3932015/01/20 2014165  ET TROJAN Suspicious User-Agent MyAgrent;  
11,3922015/01/20 2014164  ET TROJAN W32/DelfInject.A CnC Checkin 2;  
11,3912015/01/20 2014163  ET TROJAN Bifrose/Cycbot Checkin 2;  
11,3902015/01/20 2014162  ET MOBILE_MALWARE Android/SndApps.SM Sending Information to CnC; [1
11,3892015/01/20 2014161  ET MOBILE_MALWARE Android/FakeTimer.A Reporting to CnC; [1,2
11,3882015/01/20 2014160  ET DELETED Blackhole OBE Java Exploit request to /content/obe.jar;  
11,3872015/01/20 2014159  ET DELETED Blackhole Rhino Java Exploit request to /content/rino.jar;  
11,3862015/01/20 2014158  ET CURRENT_EVENTS Blackhole Acrobat 1-7 PDF exploit download request 4;  
11,3852015/01/20 2014157  ET CURRENT_EVENTS Blackhole Acrobat 8/9.3 PDF exploit download request 4;  
11,3842015/01/20 2014156  ET WEB_CLIENT Microsoft Windows Media component specific exploit;  
11,3832015/01/20 2014155  ET CURRENT_EVENTS JavaScript Obfuscation JSXX Script; [1
11,3822015/01/20 2014154  ET CURRENT_EVENTS DRIVEBY PDF Containing Subform with JavaScript;  
11,3812015/01/20 2014153  ET DOS High Orbit Ion Cannon (HOIC) Attack Inbound Generic Detection Double Spaced UA; [1
11,3802015/01/20 2014152  ET TROJAN Gozi Checkin to CnC;  
11,3792015/01/20 2014151  ET CURRENT_EVENTS Known Malicious Link Leading to Exploit Kits (t.php?id=is1);  
11,3782015/01/20 2014150  ET TROJAN Suspicious executable download possible Trojan NgrBot;  
11,3772015/01/20 2014149  ET INFO Possible URL List or Clickfraud URLs Delivered To Client;  
11,3762015/01/20 2014148  ET CURRENT_EVENTS Sakura Exploit Kit Binary Load Request;  
11,3752015/01/20 2014147  ET CURRENT_EVENTS Sakura Exploit Kit Landing Page Request; [1
11,3742015/01/20 2014146  ET TROJAN Win32/Spy.Banker Reporting Via SMTP;  
11,3732015/01/20 2014145  ET TROJAN PoisonIvy.Ehy Keepalive to CnC;  
11,3722015/01/20 2014144  ET DELETED PoisonIvy.Eks Keepalive to CnC;  
11,3712015/01/20 2014143  ET DELETED PoisonIvy.Esf Keepalive to CnC;  
11,3702015/01/20 2014142  ET CURRENT_EVENTS Likely Driveby Delivered Malicious PDF;  
11,3692015/01/20 2014141  ET DOS LOIC Javascript DDoS Outbound; [1,2
11,3682015/01/20 2014140  ET WEB_SERVER LOIC Javascript DDoS Inbound; [1,2
11,3672015/01/20 2014139  ET TROJAN Query to Known CnC Domain msnsolution.nicaze.net;  
11,3662015/01/20 2014138  ET DELETED DRIVEBY Generic Java Rhino Scripting Engine Exploit Previously Requested class.class;  
11,3652015/01/20 2014137  ET MALWARE Common Adware Library ISX User Agent Detected; [1
11,3642015/01/20 2014136  ET CURRENT_EVENTS Unknown Java Exploit Version Check with hidden applet;  
11,3632015/01/20 2014135  ET TROJAN Zeus/Reveton checkin to /images.rar;  
11,3622015/01/20 2014133  ET TROJAN W32/Jiwerks.A Checkin;  
< 311  312  313  314  315  316  317  318  319  320 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.