시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
16,0112015/01/20 2018948  ET TROJAN Likely Synolocker .onion DNS lookup;  
16,0102015/01/20 2018947  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS C2); [1
16,0092015/01/20 2018946  ET MOBILE_MALWARE Android/Locker.B Checkin 2; [1
16,0082015/01/20 2018945  ET MOBILE_MALWARE Android/Locker.B Checkin 1; [1
16,0072015/01/20 2018944  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Vawtrak MITM); [1
16,0062015/01/20 2018943  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Vawtrak MITM); [1
16,0052015/01/20 2018942  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS MITM); [1
16,0042015/01/20 2018941  ET TROJAN ClickFraud Trojan Socks5 Init Response;  
16,0032015/01/20 2018940  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dyre C2); [1
16,0022015/01/20 2018939  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (CryptoWall C2); [1
16,0012015/01/20 2018937  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS C2); [1
16,0002015/01/20 2018936  ET TROJAN Suspicious X-mailer Synapse; [1
15,9992015/01/20 2018935  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS C2);  
15,9982015/01/20 2018934  ET CURRENT_EVENTS DRIVEBY Archie.EK IE CVE-2013-2551 Payload Struct;  
15,9972015/01/20 2018933  ET CURRENT_EVENTS DRIVEBY Archie.EK Landing;  
15,9962015/01/20 2018932  ET CURRENT_EVENTS DRIVEBY Archie.EK IE Exploit URI Struct;  
15,9952015/01/20 2018931  ET CURRENT_EVENTS DRIVEBY Archie.EK CVE-2013-2551 URI Struct;  
15,9942015/01/20 2018930  ET CURRENT_EVENTS DRIVEBY Archie.EK PluginDetect URI Struct;  
15,9932015/01/20 2018929  ET TROJAN OneLouder Common URI Struct;  
15,9922015/01/20 2018928  ET TROJAN Unknown Trojan Dropped By Archie.EK;  
15,9912015/01/20 2018927  ET TROJAN Lurk Click fraud Template Request; [1
15,9902015/01/20 2018926  ET TROJAN Lurk Downloader Check-in; [1
15,9892015/01/20 2018925  ET CURRENT_EVENTS Turla/SPL EK Java Exploit Requested - /spl/; [1
15,9882015/01/20 2018924  ET CURRENT_EVENTS Turla/SPL EK Java Exploit; [1
15,9872015/01/20 2018923  ET CURRENT_EVENTS Turla/SPL EK Java Exploit; [1
15,9862015/01/20 2018922  ET CURRENT_EVENTS Turla/SPL EK Java Applet; [1
15,9852015/01/20 2018921  ET DELETED Trojan-Spy.Win32.HavexSysinfo Response; [1,2
15,9842015/01/20 2018920  ET CURRENT_EVENTS DRIVEBY Malicious Plugin Detect URI struct;  
15,9832015/01/20 2018919  ET POLICY possible Xiaomi phone data leakage HTTP; [1
15,9822015/01/20 2018918  ET POLICY possible Xiaomi phone data leakage DNS; [1
15,9812015/01/20 2018917  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2); [1
15,9802015/01/20 2018916  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2); [1
15,9792015/01/20 2018915  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2); [1
15,9782015/01/20 2018914  ET CURRENT_EVENTS Nuclear Exploit Kit exe.exe Payload; [1
15,9772015/01/20 2018913  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Vawtrak MITM); [1
15,9762015/01/20 2018912  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS C2); [1
15,9752015/01/20 2018911  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS C2); [1
15,9742015/01/20 2018910  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (Vawtrak MITM); [1
15,9732015/01/20 2018909  ET CURRENT_EVENTS Malvertising Redirection to Exploit Kit Aug 07 2014;  
15,9722015/01/20 2018908  ET INFO Session Traversal Utilities for NAT (STUN Binding Response); [1
15,9712015/01/20 2018907  ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag true); [1
15,9702015/01/20 2018906  ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false); [1
15,9692015/01/20 2018905  ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true); [1
15,9682015/01/20 2018904  ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false); [1
15,9672015/01/20 2018903  ET DELETED Dyre SSL Self-Signed Cert Aug 06 2014;  
15,9662015/01/20 2018902  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2); [1
15,9652015/01/20 2018901  ET TROJAN BITTERBUG Checkin 2;  
15,9642015/01/20 2018900  ET TROJAN BITTERBUG Checkin;  
15,9632015/01/20 2018899  ET MALWARE Win32/BrowseFox.H Checkin 2;  
15,9622015/01/20 2018898  ET CURRENT_EVENTS Possible Upatre SSL Cert tradeledstore.co.uk;  
< 221  222  223  224  225  226  227  228  229  230 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.