시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
14,6112015/01/20 2017506  ET CURRENT_EVENTS Sakura - Java Exploit Recieved - Atomic;  
14,6102015/01/20 2017505  ET TROJAN Gh0st Trojan CnC 2;  
14,6092015/01/20 2017504  ET CURRENT_EVENTS DRIVEBY Generic - *.com.exe HTTP Attachment;  
14,6082015/01/20 2017503  ET CURRENT_EVENTS Unknown EK Used in various watering hole attacks;  
14,6072015/01/20 2017502  ET CURRENT_EVENTS Probably Evil Long Unicode string only string and unescape 3;  
14,6062015/01/20 2017501  ET CURRENT_EVENTS Probably Evil Long Unicode string only string and unescape 3;  
14,6052015/01/20 2017500  ET CURRENT_EVENTS Probably Evil Long Unicode string only string and unescape 2;  
14,6042015/01/20 2017499  ET CURRENT_EVENTS Probably Evil Long Unicode string only string and unescape 1;  
14,6032015/01/20 2017498  ET CURRENT_EVENTS Blatantly Evil JS Function;  
14,6022015/01/20 2017497  ET CURRENT_EVENTS Rawin EK - Java Exploit - bona.jar;  
14,6012015/01/20 2017496  ET CURRENT_EVENTS Possible JavaFX Click To Run Bypass 3; [1
14,6002015/01/20 2017495  ET CURRENT_EVENTS Possible JavaFX Click To Run Bypass 2; [1
14,5992015/01/20 2017494  ET CURRENT_EVENTS Possible JavaFX Click To Run Bypass 1; [1
14,5982015/01/20 2017493  ET CURRENT_EVENTS Possible Neutrino EK Java Payload Download Sep 19 2013;  
14,5972015/01/20 2017492  ET CURRENT_EVENTS Possible Neutrino EK Java Exploit Download Sep 19 2013;  
14,5962015/01/20 2017491  ET CURRENT_EVENTS Neutrino EK Landing URI Format Sep 19 2013;  
14,5952015/01/20 2017490  ET TROJAN W32/Downloader.Mevade.FBV CnC Beacon; [1,2
14,5942015/01/20 2017489  ET TROJAN W32/Zzinfor.A Retrieving Instructions From CnC Server;  
14,5932015/01/20 2017488  ET CURRENT_EVENTS Unknown EK Using Office/.Net ROP/ASLR Bypass;  
14,5922015/01/20 2017487  ET CURRENT_EVENTS Unknown EK Using Office/.Net ROP/ASLR Bypass;  
14,5912015/01/20 2017486  ET CURRENT_EVENTS Unknown EK Using Office/.Net ROP/ASLR Bypass;  
14,5902015/01/20 2017485  ET CURRENT_EVENTS Unknown EK Using Office/.Net ROP/ASLR Bypass;  
14,5892015/01/20 2017484  ET CURRENT_EVENTS Unknown EK Using Office/.Net ROP/ASLR Bypass;  
14,5882015/01/20 2017483  ET CURRENT_EVENTS Unknown EK Using Office/.Net ROP/ASLR Bypass;  
14,5872015/01/20 2017482  ET CURRENT_EVENTS DRIVEBY Styx - TDS - Redirect To Landing Page;  
14,5862015/01/20 2017481  ET CURRENT_EVENTS BlackHole initial landing/gate;  
14,5852015/01/20 2017480  ET WEB_CLIENT CVE-2013-3893 IE Memory Corruption Vulnerability; [1
14,5842015/01/20 2017479  ET WEB_CLIENT CVE-2013-3893 IE Memory Corruption Vulnerability; [1
14,5832015/01/20 2017478  ET WEB_CLIENT CVE-2013-3893 IE Memory Corruption Vulnerability; [1
14,5822015/01/20 2017477  ET WEB_CLIENT CVE-2013-3893 Possible IE Memory Corruption Vulnerability with HXDS ASLR Bypass; [1
14,5812015/01/20 2017476  ET CURRENT_EVENTS DRIVEBY SweetOrange - Java Exploit Downloaded;  
14,5802015/01/20 2017475  ET TROJAN Win32/Dipverdle.A Activity;  
14,5792015/01/20 2017474  ET CURRENT_EVENTS CoolEK Variant Landing Page - Applet Sep 16 2013;  
14,5782015/01/20 2017473  ET CURRENT_EVENTS Possible CoolEK Variant Payload Download Sep 16 2013;  
14,5772015/01/20 2017472  ET CURRENT_EVENTS SNET EK Encoded VBS 3;  
14,5762015/01/20 2017471  ET CURRENT_EVENTS SNET EK Encoded VBS 2;  
14,5752015/01/20 2017470  ET CURRENT_EVENTS SNET EK Encoded VBS 1;  
14,5742015/01/20 2017469  ET CURRENT_EVENTS Possible SNET EK VBS Download;  
14,5732015/01/20 2017468  ET CURRENT_EVENTS Unknown EK Fake Microsoft Security Update Applet Sep 16 2013;  
14,5722015/01/20 2017467  ET CURRENT_EVENTS CottonCastle EK Java Jar;  
14,5712015/01/20 2017466  ET MOBILE_MALWARE Android/FakeAhnAV.A CnC Beacon; [1
14,5702015/01/20 2017465  ET TROJAN W32/Hesperus.Banker Nlog.php Variant Sending Data To CnC; [1
14,5692015/01/20 2017464  ET TROJAN W32/Hesperus.Banker Tr-mail Variant Sending Data To CnC; [1
14,5682015/01/20 2017463  ET WEB_CLIENT MS13-055 CAnchorElement Use-After-Free;  
14,5672015/01/20 2017462  ET TROJAN ZeroAccess P2P Module v6 Reporting; [1
14,5662015/01/20 2017461  ET CURRENT_EVENTS Blackhole obfuscated base64 decoder Sep 12 2013;  
14,5652015/01/20 2017460  ET INFO SUSPICIOUS Java request to UNI.ME Domain Set 4;  
14,5642015/01/20 2017459  ET INFO SUSPICIOUS Java request to UNI.ME Domain Set 3;  
14,5632015/01/20 2017458  ET INFO SUSPICIOUS Java request to UNI.ME Domain Set 2;  
14,5622015/01/20 2017457  ET INFO SUSPICIOUS Java request to UNI.ME Domain Set 1;  
< 251  252  253  254  255  256  257  258  259  260 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.