시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
14,8612015/01/20 2017764  ET CURRENT_EVENTS SUSPICIOUS Java Request With Uncompressed JAR/Class Importing jmx mbeanserver;  
14,8602015/01/20 2017763  ET CURRENT_EVENTS SUSPICIOUS Java Request With Uncompressed JAR/Class B64 encoded class;  
14,8592015/01/20 2017762  ET CURRENT_EVENTS SUSPICIOUS Java Request With Uncompressed JAR/Class Accessing Importing glassfish;  
14,8582015/01/20 2017761  ET CURRENT_EVENTS SUSPICIOUS Java Request With Uncompressed JAR/Class file Importing Protection Domain;  
14,8572015/01/20 2017760  ET CURRENT_EVENTS SUSPICIOUS Java Request With Uncompressed JAR/Class file Accessing Security Manager;  
14,8562015/01/20 2017759  ET CURRENT_EVENTS Possible Java Lang Runtime in B64 Observed in Goon EK 3;  
14,8552015/01/20 2017758  ET CURRENT_EVENTS Possible Java Lang Runtime in B64 Observed in Goon EK 2;  
14,8542015/01/20 2017757  ET CURRENT_EVENTS Possible Java Lang Runtime in B64 Observed in Goon EK 1;  
14,8532015/01/20 2017756  ET CURRENT_EVENTS Possible Goon EK Jar Download;  
14,8522015/01/20 2017755  ET CURRENT_EVENTS Possible Goon EK Java Payload;  
14,8512015/01/20 2017754  ET CURRENT_EVENTS Possible PHISH Remax - Other Creds;  
14,8502015/01/20 2017753  ET CURRENT_EVENTS Possible PHISH Remax - Hotmail Creds;  
14,8492015/01/20 2017752  ET CURRENT_EVENTS Possible PHISH Remax - GMail Creds;  
14,8482015/01/20 2017751  ET CURRENT_EVENTS Possible PHISH Remax - Yahoo Creds;  
14,8472015/01/20 2017750  ET CURRENT_EVENTS Possible PHISH Remax - AOL Creds;  
14,8462015/01/20 2017749  ET INFO Java Downloading Class flowbit no alert;  
14,8452015/01/20 2017748  ET INFO Java Downloading Archive flowbit no alert;  
14,8442015/01/20 2017747  ET TROJAN Trojan-Downloader Win32.Genome.AV server response;  
14,8432015/01/20 2017746  ET TROJAN Trojan-Downloader Win32.Genome.AV;  
14,8422015/01/20 2017745  ET CURRENT_EVENTS Fake Media Player malware binary requested;  
14,8412015/01/20 2017744  ET CURRENT_EVENTS StyX EK Payload Cookie;  
14,8402015/01/20 2017743  ET CURRENT_EVENTS Possible WhiteLotus IE Payload;  
14,8392015/01/20 2017742  ET TROJAN Solarbot Check-in;  
14,8382015/01/20 2017741  ET TROJAN Kryptik Check-in;  
14,8372015/01/20 2017740  ET CURRENT_EVENTS Sweet Orange Landing Page Nov 21 2013;  
14,8362015/01/20 2017739  ET CURRENT_EVENTS Possible WhiteLotus Java Payload;  
14,8352015/01/20 2017738  ET CURRENT_EVENTS Possible WhiteLotus EK 2013-2551 Exploit 3;  
14,8342015/01/20 2017737  ET CURRENT_EVENTS Possible WhiteLotus EK 2013-2551 Exploit 2;  
14,8332015/01/20 2017736  ET CURRENT_EVENTS Possible WhiteLotus EK 2013-2551 Exploit 1;  
14,8322015/01/20 2017735  ET CURRENT_EVENTS WhiteLotus EK PluginDetect Nov 20 2013;  
14,8312015/01/20 2017734  ET WEB_SERVER WEBSHELL pwn.jsp shell; [1,2
14,8302015/01/20 2017733  ET DELETED Possible Upatre Downloader SSL certificate;  
14,8292015/01/20 2017732  ET CURRENT_EVENTS Possible Styx/Angler SilverLight Exploit;  
14,8282015/01/20 2017731  ET CURRENT_EVENTS Possible Styx EK SilverLight Payload;  
14,8272015/01/20 2017730  ET EXPLOIT JavaX Toolkit Posting Plugin-Detect Data; [1
14,8262015/01/20 2017729  ET CURRENT_EVENTS Angler Landing Nov 18 2013;  
14,8252015/01/20 2017728  ET TROJAN Trojan.Dropper.Win32.Dapato.braa.AMN CnC traffic;  
14,8242015/01/20 2017727  ET TROJAN Possible SSH Linux.Fokirtor backchannel command; [1
14,8232015/01/20 2017726  ET TROJAN Downloader (P2P Zeus dropper UA);  
14,8222015/01/20 2017725  ET TROJAN Sisproc update;  
14,8212015/01/20 2017724  ET TROJAN PWS Win32/Lmir.BMQ checkin; [1
14,8202015/01/20 2017723  ET TROJAN Trojan.BlackRev Botnet Command Request CnC Beacon; [1
14,8192015/01/20 2017722  ET DOS Trojan.BlackRev V1.Botnet HTTP Login POST Flood Traffic Inbound; [1
14,8182015/01/20 2017721  ET TROJAN Trojan.BlackRev V1.Botnet HTTP Login POST Flood Traffic Outbound; [1
14,8172015/01/20 2017718  ET TROJAN Trojan.BlackRev Botnet Login Request CnC Beacon; [1
14,8162015/01/20 2017717  ET TROJAN Trojan.BlackRev Botnet Monitor Request CnC Beacon; [1
14,8152015/01/20 2017716  ET TROJAN Athena Bot Nick in IRC; [1
14,8142015/01/20 2017715  ET CURRENT_EVENTS Possible Angler EK SilverLight Exploit;  
14,8132015/01/20 2017714  ET TROJAN PlugX Checkin; [1
14,8122015/01/20 2017713  ET TROJAN Taidoor Checkin; [1
< 241  242  243  244  245  246  247  248  249  250 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.