시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
15,7612015/01/20 2018692  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2); [1
15,7602015/01/20 2018691  ET CURRENT_EVENTS Possible Upatre SSL Cert deslematin.ca;  
15,7592015/01/20 2018690  ET CURRENT_EVENTS Possible Upatre SSL Cert karinejoncas.com;  
15,7582015/01/20 2018689  ET DELETED LibSSH2 Based SSH Connection - Often used as a BruteForce Tool;  
15,7572015/01/20 2018688  ET TROJAN Predator Pain Sending Data over SMTP; [1
15,7562015/01/20 2018687  ET TROJAN Win32/Aibatook checkin 2; [1
15,7552015/01/20 2018686  ET CURRENT_EVENTS Possible Malvertising Redirect URI Struct Jul 16 2014;  
15,7542015/01/20 2018685  ET TROJAN Win32/Aibatook checkin; [1
15,7532015/01/20 2018683  ET TROJAN Dyreza RAT Checkin 2; [1
15,7522015/01/20 2018682  ET TROJAN W32/Kazy.325252 Variant CnC Beacon 2; [1
15,7512015/01/20 2018681  ET TROJAN W32/Kazy.325252 Variant CnC Beacon 1; [1
15,7502015/01/20 2018680  ET TROJAN Soraya Credit Card Exfiltration; [1
15,7492015/01/20 2018679  ET TROJAN DNS Possible User trying to visit POSHCODER.A .onion link outside of torbrowser;  
15,7482015/01/20 2018678  ET TROJAN Upatre Common URI Struct July 15 2014;  
15,7472015/01/20 2018677  ET TROJAN Win32.Sharik Microsoft Connectivity check;  
15,7462015/01/20 2018676  ET TROJAN Win32.Sharik Adobe Connectivity check;  
15,7452015/01/20 2018675  ET TROJAN Linux DDoS bot Antiq IRC; [1
15,7442015/01/20 2018674  ET CURRENT_EVENTS Possible Upatre SSL Cert faithmentoringandmore.com;  
15,7432015/01/20 2018673  ET CURRENT_EVENTS Possible Upatre SSL Cert July 14 2014;  
15,7422015/01/20 2018672  ET CURRENT_EVENTS Possible Upatre SSL Cert new-install.privatedns.com;  
15,7412015/01/20 2018671  ET CURRENT_EVENTS Possible Upatre SSL Cert acesecureshop.com;  
15,7402015/01/20 2018670  ET TROJAN Uroburos/Turla CnC (OUTBOUND) 2; [1
15,7392015/01/20 2018669  ET TROJAN Uroburos/Turla CnC (OUTBOUND) 1; [1
15,7382015/01/20 2018668  ET CURRENT_EVENTS Safe/CritX/FlashPack EK Secondary Landing Jul 11 2014;  
15,7372015/01/20 2018667  ET TROJAN Possible Zeus P2P Variant Check-in; [1
15,7362015/01/20 2018666  ET TROJAN Possible Zeus P2P Variant DGA NXDOMAIN Responses July 11 2014; [1
15,7352015/01/20 2018665  ET TROJAN Enfal.F Checkin via HTTP Post 7; [1
15,7342015/01/20 2018664  ET TROJAN Minirem;  
15,7332015/01/20 2018663  ET MOBILE_MALWARE Android Spyware Dowgin Checkin;  
15,7322015/01/20 2018661  ET TROJAN Win32/Zemot Config Download;  
15,7312015/01/20 2018660  ET TROJAN CyberGate RAT User-Agent (USER_CHECK);  
15,7302015/01/20 2018659  ET TROJAN CyberGate RAT Checkin;  
15,7292015/01/20 2018658  ET WEB_CLIENT Adobe Flash Player Rosetta Flash compressed ZWS; [1
15,7282015/01/20 2018657  ET WEB_CLIENT Adobe Flash Player Rosetta Flash compressed FWS; [1
15,7272015/01/20 2018656  ET WEB_CLIENT Adobe Flash Player Rosetta Flash compressed CWS; [1
15,7262015/01/20 2018654  ET TROJAN Downloader.Banload2.KZU Checkin 2;  
15,7252015/01/20 2018653  ET TROJAN Downloader.Banload2.KZU Checkin 1;  
15,7242015/01/20 2018652  ET WEB_SPECIFIC_APPS Oracle Event Processing FileUploadServlet Arbitrary File Upload; [1
15,7232015/01/20 2018651  ET TROJAN Upatre SSL Cert July 7 2014;  
15,7222015/01/20 2018650  ET TROJAN Win32.Banload.BTQP Checkin 2;  
15,7212015/01/20 2018649  ET TROJAN Win32.Banload.BTQP Checkin 1;  
15,7202015/01/20 2018648  ET WEB_SPECIFIC_APPS Possible WP Plug-in MailPoet Arbitrary File Upload/Auth Bypass Vulnerability; [1
15,7192015/01/20 2018647  ET CURRENT_EVENTS Possible Upatre SSL Cert 999servers.com;  
15,7182015/01/20 2018646  ET TROJAN Infostealer.Bancos Checkin via SMTP;  
15,7172015/01/20 2018645  ET TROJAN TrojanSpy.Win32/Banker.AMB SQL Checkin;  
15,7162015/01/20 2018644  ET TROJAN Win32/Zemot Checkin;  
15,7152015/01/20 2018643  ET TROJAN Win32/Zemot Checkin;  
15,7142015/01/20 2018642  ET TROJAN DNS Reply Sinkhole Microsoft NO-IP Domain;  
15,7132015/01/20 2018641  ET TROJAN BANKER.WIN32.BANBRA.BEEC Checkin;  
15,7122015/01/20 2018640  ET TROJAN Unknown Trojan with Fake Java User-Agent;  
< 221  222  223  224  225  226  227  228  229  230 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.