시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
14,0612015/01/20 2016936  ET WEB_SERVER SQL Injection Local File Access Attempt Using LOAD_FILE; [1,2
14,0602015/01/20 2016935  ET WEB_SERVER SQL Injection Select Sleep Time Delay; [1
14,0592015/01/20 2016934  ET TROJAN W32/Safe User Agent Fantasia; [1
14,0582015/01/20 2016933  ET CURRENT_EVENTS SUSPICIOUS Java Request to Afraid.org Top 100 Dynamic DNS Domain May 28 2013;  
14,0572015/01/20 2016932  ET TROJAN Spy/Infostealer.Win32.Embed.A Client Traffic; [1
14,0562015/01/20 2016931  ET CURRENT_EVENTS BlackHole EK JNLP request;  
14,0552015/01/20 2016930  ET CURRENT_EVENTS Possible HellSpawn EK Java Artifact May 24 2013;  
14,0542015/01/20 2016929  ET CURRENT_EVENTS Possible HellSpawn EK Fake Flash May 24 2013;  
14,0532015/01/20 2016928  ET CURRENT_EVENTS HellSpawn EK Landing 2 May 24 2013;  
14,0522015/01/20 2016927  ET CURRENT_EVENTS HellSpawn EK Landing 1 May 24 2013;  
14,0512015/01/20 2016926  ET CURRENT_EVENTS KaiXin Exploit Landing Page 2 May 24 2013; [1
14,0502015/01/20 2016925  ET CURRENT_EVENTS KaiXin Exploit Landing Page 1 May 24 2013; [1
14,0492015/01/20 2016924  ET CURRENT_EVENTS KaiXin Exploit Kit Java Class 2 May 24 2013; [1
14,0482015/01/20 2016923  ET CURRENT_EVENTS KaiXin Exploit Kit Java Class 1 May 24 2013; [1
14,0472015/01/20 2016922  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic; [1,2,3,4,5,6
14,0462015/01/20 2016921  ET INFO Suspicious Mozilla UA with no Space after colon;  
14,0452015/01/20 2016920  ET WEB_SERVER Apache Struts Possible xwork Disable Method Execution; [1
14,0442015/01/20 2016919  ET CURRENT_EVENTS Malicious Redirect URL;  
14,0432015/01/20 2016918  ET WEB_SERVER Possible NGINX Overflow CVE-2013-2028 Exploit Specific; [1,2
14,0422015/01/20 2016917  ET MALWARE Adware pricepeep Adware.Shopper.297; [1,2
14,0412015/01/20 2016916  ET MALWARE Suspicious User Agent Custom_56562_HttpClient/VER_STR_COMMA;  
14,0402015/01/20 2016915  ET MALWARE Suspicious User Agent Smart-RTP; [1,2
14,0392015/01/20 2016914  ET TROJAN Trojan.Win32.Antavmu.guw Checkin; [1,2
14,0382015/01/20 2016913  ET TROJAN Backdoor.Win32.VB.Alsci/Dragon Eye RAT Checkin (sending user info); [1,2
14,0372015/01/20 2016912  ET TROJAN W32/KeyLogger.ACQH!tr Checkin; [1,2
14,0362015/01/20 2016911  ET TROJAN W32/Briba CnC POST Beacon; [1,2,3
14,0352015/01/20 2016910  ET TROJAN Trojan.BlackRev Get Command Rev3; [1
14,0342015/01/20 2016909  ET TROJAN Trojan.BlackRev Registration Rev3; [1
14,0332015/01/20 2016908  ET TROJAN Trojan.Win32.FresctSpy.A User-Agent (MBVDFRESCT); [1
14,0322015/01/20 2016907  ET TROJAN Trojan-Spy.Win32.Agent.byhm User-Agent (EMSCBVDFRT);  
14,0312015/01/20 2016906  ET MALWARE AdWare.MSIL.Solimba.b POST; [1
14,0302015/01/20 2016905  ET MALWARE AdWare.MSIL.Solimba.b GET; [1
14,0292015/01/20 2016904  ET USER_AGENTS User-Agent (ChilkatUpload); [1
14,0282015/01/20 2016903  ET USER_AGENTS Suspicious User-Agent (DownloadMR); [1
14,0272015/01/20 2016902  ET TROJAN Trojan.BlackRev Download Executable; [1
14,0262015/01/20 2016901  ET DELETED Trojan.BlackRev Download Executable; [1
14,0252015/01/20 2016900  ET DELETED Trojan.BlackRev Polling for DoS targets; [1
14,0242015/01/20 2016899  ET TROJAN Trojan.BlackRev Registering Client; [1
14,0232015/01/20 2016898  ET INFO Suspicious MSIE 10 on Windows NT 5;  
14,0222015/01/20 2016897  ET TROJAN Possible Win32/Gapz MSIE 9 on Windows NT 5; [1
14,0212015/01/20 2016896  ET CURRENT_EVENTS Unknown EK Requesting Payload;  
14,0202015/01/20 2016895  ET TROJAN TrojanSpy.KeyLogger Hangover Campaign User-Agent(bugmaal); [1,2
14,0192015/01/20 2016894  ET TROJAN TrojanSpy.KeyLogger Hangover Campaign User-Agent(nento); [1,2
14,0182015/01/20 2016893  ET TROJAN TrojanSpy.KeyLogger Hangover Campaign User-Agent(smaal); [1,2
14,0172015/01/20 2016892  ET TROJAN TrojanSpy.KeyLogger Hangover Campaign User-Agent(folderwin); [1,2
14,0162015/01/20 2016891  ET TROJAN TrojanSpy.KeyLogger Hangover Campaign User-Agent(vbusers); [1,2
14,0152015/01/20 2016890  ET DELETED TrojanSpy.KeyLogger Hangover Campaign User-Agent(file); [1,2
14,0142015/01/20 2016889  ET DELETED TrojanSpy.KeyLogger Hangover Campaign User-Agent(wininetget/0.1); [1,2
14,0132015/01/20 2016888  ET TROJAN TrojanSpy.KeyLogger Hangover Campaign User-Agent(sendFile); [1,2
14,0122015/01/20 2016887  ET TROJAN TrojanSpy.KeyLogger Hangover Campaign User-Agent(UPHTTP); [1,2
< 261  262  263  264  265  266  267  268  269  270 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.