시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,5112015/01/20 2016371  ET CURRENT_EVENTS Exploit Kit Java jpg download;  
13,5102015/01/20 2016370  ET TROJAN Win32/Toby.N Multilocker Image Request; [1
13,5092015/01/20 2016369  ET TROJAN Win32/Toby.N Multilocker Request; [1
13,5082015/01/20 2016368  ET TROJAN Win32/Toby.N Multilocker Checkin; [1
13,5072015/01/20 2016367  ET TROJAN Umbra/MultiBot Plugin access; [1
13,5062015/01/20 2016366  ET TROJAN Umbra/Multibot Loader User-Agent (umbra); [1
13,5052015/01/20 2016365  ET CURRENT_EVENTS CritXPack Jar Request (3);  
13,5042015/01/20 2016364  ET DOS CVE-2013-0230 Miniupnpd SoapAction MethodName Buffer Overflow; [1,2
13,5032015/01/20 2016363  ET DOS Miniupnpd M-SEARCH Buffer Overflow CVE-2013-0229; [1,2
13,5022015/01/20 2016361  ET INFO JAVA - ClassID;  
13,5012015/01/20 2016360  ET INFO JAVA - ClassID;  
13,5002015/01/20 2016359  ET TROJAN Request for fake postal receipt from e-mail link;  
13,4992015/01/20 2016358  ET DELETED W32/ZeroAccess Counter.img Checkin; [1
13,4982015/01/20 2016357  ET CURRENT_EVENTS CritXPack - URI - jpfoff.php;  
13,4972015/01/20 2016356  ET CURRENT_EVENTS CritXPack - Landing Page - Received;  
13,4962015/01/20 2016355  ET TROJAN W32/ServStart.Variant CnC Beacon;  
13,4952015/01/20 2016354  ET CURRENT_EVENTS WSO WebShell Activity POST structure 2;  
13,4942015/01/20 2016353  ET CURRENT_EVENTS Styx Exploit Kit Landing Applet With Getmyfile.exe Payload; [1
13,4932015/01/20 2016352  ET CURRENT_EVENTS Styx Exploit Kit Jerk.cgi TDS; [1
13,4922015/01/20 2016350  ET CURRENT_EVENTS WhiteHole Exploit Kit Payload Download;  
13,4912015/01/20 2016349  ET CURRENT_EVENTS WhiteHole Exploit Kit Jar Request;  
13,4902015/01/20 2016348  ET CURRENT_EVENTS WhiteHole Exploit Landing Page;  
13,4892015/01/20 2016347  ET CURRENT_EVENTS Styx Exploit Kit Secondary Landing;  
13,4882015/01/20 2016345  ET MOBILE_MALWARE DroidKungFu Variant;  
13,4872015/01/20 2016344  ET MOBILE_MALWARE Android/Fakelash.A!tr.spy Checkin; [1
13,4862015/01/20 2016343  ET MOBILE_MALWARE Android TrojanFakeLookout.A; [1
13,4852015/01/20 2016342  ET TROJAN W32/Beebus HTTP POST CnC Beacon; [1
13,4842015/01/20 2016341  ET CURRENT_EVENTS Blackhole Java applet with obfuscated URL Feb 04 2012;  
13,4832015/01/20 2016340  ET WEB_SPECIFIC_APPS CMSQLITE mediaAdmin.php file Local File Inclusion Attempt; [1
13,4822015/01/20 2016339  ET WEB_SPECIFIC_APPS CMSQLITE id parameter Cross Site Scripting Attempt; [1
13,4812015/01/20 2016338  ET WEB_SPECIFIC_APPS WordPress Chocolate WP Theme src Remote File Inclusion Attempt; [1
13,4802015/01/20 2016337  ET WEB_SPECIFIC_APPS WordPress Chocolate WP Theme src Cross Site Scripting Attempt; [1
13,4792015/01/20 2016336  ET WEB_SPECIFIC_APPS OSClass id parameter data access Attempt 2; [1
13,4782015/01/20 2016335  ET WEB_SPECIFIC_APPS OSClass id parameter data access Attempt 1; [1
13,4772015/01/20 2016334  ET WEB_SPECIFIC_APPS OSClass file Parameter Remote File Access Attempt; [1
13,4762015/01/20 2016333  ET CURRENT_EVENTS Possible g01pack Landing Page;  
13,4752015/01/20 2016331  ET TROJAN W32/Jabberbot.A Trednet XMPP CnC Beacon; [1
13,4742015/01/20 2016330  ET TROJAN W32/SecVerif.Downloader Second Stage Download Request; [1
13,4732015/01/20 2016329  ET TROJAN W32/SecVerif.Downloader Initial Checkin; [1
13,4722015/01/20 2016328  ET TROJAN ZeuS Post to C&C footer.php;  
13,4712015/01/20 2016327  ET CURRENT_EVENTS PHISH Generic - POST to myform.php;  
13,4702015/01/20 2016326  ET DOS LibuPnP CVE-2012-5961 ST UDN Buffer Overflow;  
13,4692015/01/20 2016325  ET DOS LibuPnP CVE-2012-5965 ST URN DeviceType Buffer Overflow;  
13,4682015/01/20 2016324  ET DOS LibuPnP CVE-2012-5964 ST URN ServiceType Buffer Overflow;  
13,4672015/01/20 2016323  ET DOS LibuPnP CVE-2012-5963 ST UDN Buffer Overflow;  
13,4662015/01/20 2016322  ET DOS LibuPnP CVE-2012-5958 ST DeviceType Buffer Overflow;  
13,4652015/01/20 2016321  ET CURRENT_EVENTS Possible g01pack Jar download;  
13,4642015/01/20 2016320  ET CURRENT_EVENTS Exploit Kit Java gif download;  
13,4632015/01/20 2016319  ET CURRENT_EVENTS Impact Exploit Kit Landing Page;  
13,4622015/01/20 2016318  ET MOBILE_MALWARE Android/Ksapp.A Checkin; [1,2,3
< 271  272  273  274  275  276  277  278  279  280 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.