시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,9112015/01/20 2016786  ET CURRENT_EVENTS Sakura - Payload Requested;  
13,9102015/01/20 2016785  ET CURRENT_EVENTS Sakura - Java Exploit Recievied;  
13,9092015/01/20 2016784  ET CURRENT_EVENTS Fiesta - Payload - flashplayer11;  
13,9082015/01/20 2016782  ET CURRENT_EVENTS CoolEK Payload Download (8);  
13,9072015/01/20 2016781  ET CURRENT_EVENTS Sakura obfuscated javascript Apr 21 2013;  
13,9062015/01/20 2016780  ET MALWARE Adware.Win32/SProtector.A Client Checkin;  
13,9052015/01/20 2016779  ET CURRENT_EVENTS Fake DHL Kuluoz.B URI;  
13,9042015/01/20 2016778  ET INFO DNS Query to a *.pw domain - Likely Hostile;  
13,9032015/01/20 2016777  ET INFO HTTP Request to a *.pw domain;  
13,9022015/01/20 2016776  ET DELETED Blackhole/Cool plugindetect in octal Apr 18 2013;  
13,9012015/01/20 2016775  ET INFO Generic HTTP EXE Upload Outbound;  
13,9002015/01/20 2016774  ET INFO Generic HTTP EXE Upload Inbound;  
13,8992015/01/20 2016773  ET TROJAN Mutter Backdoor Checkin; [1
13,8982015/01/20 2016772  ET TROJAN Win32/Enchanim C2 Client Check-in; [1
13,8972015/01/20 2016771  ET TROJAN Win32/Enchanim C2 Injection Download; [1
13,8962015/01/20 2016770  ET TROJAN Win32/Enchanim Process List Dump; [1
13,8952015/01/20 2016769  ET TROJAN Win32/Enchanim Check-in Response; [1
13,8942015/01/20 2016768  ET TROJAN Backdoor.Win32.Dorkbot.AR Join IRC channel; [1
13,8932015/01/20 2016767  ET INFO EXE - SCR in PKZip Compressed Data Download;  
13,8922015/01/20 2016766  ET INFO PDF - Acrobat Enumeration - var PDFObject;  
13,8912015/01/20 2016765  ET INFO PDF - Acrobat Enumeration - pdfobject.js;  
13,8902015/01/20 2016764  ET CURRENT_EVENTS SofosFO PDF Payload Download;  
13,8892015/01/20 2016763  ET SCAN Non-Malicious SSH/SSL Scanner on the run; [1,2
13,8882015/01/20 2016762  ET WEB_SERVER WebShell - PHPShell - PHPKonsole URI;  
13,8872015/01/20 2016761  ET WEB_SERVER WebShell - PHPShell - Haxplorer URI;  
13,8862015/01/20 2016760  ET WEB_SERVER WebShell - PHPShell - Comment;  
13,8852015/01/20 2016759  ET TROJAN Win32/Redyms.A Checkin;  
13,8842015/01/20 2016758  ET POLICY Bitcoin Mining Extensions Header;  
13,8832015/01/20 2016757  ET TROJAN W32/Nymaim Checkin (2);  
13,8822015/01/20 2016756  ET CURRENT_EVENTS Neutrino EK Plugin-Detect April 12 2013;  
13,8812015/01/20 2016755  ET CURRENT_EVENTS Blackhole 2 Landing Page (9);  
13,8802015/01/20 2016754  ET POLICY Internal Host Retrieving External IP via myip.dnsomatic.com - Possible Infection;  
13,8792015/01/20 2016753  ET CURRENT_EVENTS Possible Neutrino EK Posting Plugin-Detect Data April 12 2013;  
13,8782015/01/20 2016752  ET DELETED W32/Nymaim Checkin;  
13,8772015/01/20 2016751  ET CURRENT_EVENTS RedKit/Sakura/CritX/SafePack/FlashPack applet obfuscated URL Apr 10 2013;  
13,8762015/01/20 2016749  ET TROJAN RansomCrypt Getting Template;  
13,8752015/01/20 2016748  ET TROJAN RansomCrypt Intial Check-in;  
13,8742015/01/20 2016746  ET TROJAN W32/NSISDL.Downloader CnC Server Response;  
13,8732015/01/20 2016744  ET POLICY NSISDL Iplookup.php IPCheck;  
13,8722015/01/20 2016743  ET TROJAN W32/Citadel Conf.bin Download From CnC Server; [1,2
13,8712015/01/20 2016742  ET TROJAN Possible W32/Citadel Download From CnC Server Self Referenced /files/ attachment; [1,2
13,8702015/01/20 2016741  ET TROJAN W32/Citadel Pro File.php CnC POST; [1,2
13,8692015/01/20 2016740  ET TROJAN W32/Citadel Content.php CnC POST; [1,2
13,8682015/01/20 2016739  ET TROJAN W32/Citadel File.php CnC POST; [1,2
13,8672015/01/20 2016738  ET CURRENT_EVENTS W32/Citadel Infection or Config URL Request; [1,2
13,8662015/01/20 2016737  ET CURRENT_EVENTS GonDadEK Kit Jar; [1
13,8652015/01/20 2016736  ET CURRENT_EVENTS GonDadEK Java Exploit Requested;  
13,8642015/01/20 2016735  ET CURRENT_EVENTS GonDadEK Java Exploit Requested;  
13,8632015/01/20 2016734  ET CURRENT_EVENTS RedKit applet obfuscated URL Apr 7 2013;  
13,8622015/01/20 2016733  ET CURRENT_EVENTS Sakura encrypted binary (2);  
< 261  262  263  264  265  266  267  268  269  270 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.