번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
15,711 | 2015/01/20 | 2018639 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 39; [1,2] |
15,710 | 2015/01/20 | 2018638 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 38; [1,2] |
15,709 | 2015/01/20 | 2018637 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 37; [1,2] |
15,708 | 2015/01/20 | 2018636 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 36; [1,2] |
15,707 | 2015/01/20 | 2018635 | ET TROJAN Common Upatre Header Structure 2; |
15,706 | 2015/01/20 | 2018634 | ET TROJAN W32/Antifulai.APT CnC Beacon 4; [1] |
15,705 | 2015/01/20 | 2018633 | ET TROJAN W32/Antifulai.APT CnC Beacon 3; [1] |
15,704 | 2015/01/20 | 2018632 | ET TROJAN W32/Antifulai.APT CnC Beacon 2; [1] |
15,703 | 2015/01/20 | 2018631 | ET TROJAN W32/Antifulai.APT CnC Beacon 1; [1] |
15,702 | 2015/01/20 | 2018630 | ET MOBILE_MALWARE Android/Comll.Banker RAT CnC Beacon; [1] |
15,701 | 2015/01/20 | 2018629 | ET TROJAN Trojan.Karagany C&C Response; [1] |
15,700 | 2015/01/20 | 2018626 | ET TROJAN Downloader.Win32.Tesch.A Server Command (bot is ready to start receiving commands); [1] |
15,699 | 2015/01/20 | 2018625 | ET TROJAN Downloader.Win32.Tesch.A Server Command (Confirm C2 IP and port) 2; [1] |
15,698 | 2015/01/20 | 2018624 | ET TROJAN Downloader.Win32.Tesch.A Server Command (Confirm C2 IP and port); [1] |
15,697 | 2015/01/20 | 2018623 | ET TROJAN Downloader.Win32.Tesch.A Bot Command (Proxy command); [1] |
15,696 | 2015/01/20 | 2018622 | ET TROJAN Downloader.Win32.Tesch.A Bot Command (OK acknowledgement); [1] |
15,695 | 2015/01/20 | 2018620 | ET TROJAN Downloader.Win32.Tesch.A Bot Command Checkin 2; |
15,694 | 2015/01/20 | 2018618 | ET TROJAN Possible W32/VBKlip BAN Download; [1] |
15,693 | 2015/01/20 | 2018617 | ET MALWARE Downloader.NSIS.OutBrowse.b Checkin; [1] |
15,692 | 2015/01/20 | 2018616 | ET TROJAN Win32/Sharik C2 Incoming Crafted Request; |
15,691 | 2015/01/20 | 2018615 | ET TROJAN Win32/Sharik C2 Incoming Traffic; |
15,690 | 2015/01/20 | 2018614 | ET TROJAN Win32/Sharik Checkin; |
15,689 | 2015/01/20 | 2018613 | ET CURRENT_EVENTS Evil EK Redirector Cookie June 27 2014; |
15,688 | 2015/01/20 | 2018612 | ET WEB_SPECIFIC_APPS Cacti Superlinks Plugin SQL Injection; [1] |
15,687 | 2015/01/20 | 2018611 | ET DELETED Win32/Tesch.A Checkin; [1] |
15,686 | 2015/01/20 | 2018610 | ET TROJAN Likely CryptoWall .onion Proxy domain in SNI; |
15,685 | 2015/01/20 | 2018609 | ET TROJAN Likely CryptoWall .onion Proxy DNS lookup; |
15,684 | 2015/01/20 | 2018608 | ET TROJAN Suspicious User-Agent (HardCore Software For); |
15,683 | 2015/01/20 | 2018607 | ET WEB_SERVER PHP Crawler; [1] |
15,682 | 2015/01/20 | 2018606 | ET CURRENT_EVENTS Safe/CritX/FlashPack EK Secondary Landing June 25 2014; |
15,681 | 2015/01/20 | 2018605 | ET WEB_SPECIFIC_APPS TimThumb Remote Command Execution; [1] |
15,680 | 2015/01/20 | 2018604 | ET TROJAN Andromeda Downloading Module; |
15,679 | 2015/01/20 | 2018603 | ET WEB_SERVER c99 Shell Backdoor Var Override Client Body; [1] |
15,678 | 2015/01/20 | 2018602 | ET WEB_SERVER c99 Shell Backdoor Var Override Cookie; [1] |
15,677 | 2015/01/20 | 2018601 | ET WEB_SERVER c99 Shell Backdoor Var Override URI; [1] |
15,676 | 2015/01/20 | 2018600 | ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2); [1] |
15,675 | 2015/01/20 | 2018599 | ET TROJAN W32/Citadel Download From CnC Server /files/ attachment; [1] |
15,674 | 2015/01/20 | 2018598 | ET TROJAN Citadel Checkin; [1] |
15,673 | 2015/01/20 | 2018597 | ET TROJAN Dyreza RAT Checkin Response 2; [1] |
15,672 | 2015/01/20 | 2018596 | ET TROJAN Dyreza RAT Checkin Response; [1] |
15,671 | 2015/01/20 | 2018595 | ET CURRENT_EVENTS DRIVEBY Nuclear EK Landing May 23 2014; |
15,670 | 2015/01/20 | 2018594 | ET CURRENT_EVENTS Possible Upatre SSL Cert webhostingpad.com; |
15,669 | 2015/01/20 | 2018593 | ET CURRENT_EVENTS Safe/CritX/FlashPack EK CVE-2013-3918; |
15,668 | 2015/01/20 | 2018592 | ET CURRENT_EVENTS Multiple EKs CVE-2013-3918; |
15,667 | 2015/01/20 | 2018591 | ET CURRENT_EVENTS Trojan-Banker.JS.Banker fraudulent redirect boleto payment code; [1] |
15,666 | 2015/01/20 | 2018590 | ET MALWARE Adware.MultiInstaller checkin 2; |
15,665 | 2015/01/20 | 2018589 | ET CURRENT_EVENTS Possible ASPROX Download URI Struct June 19 2014; |
15,664 | 2015/01/20 | 2018588 | ET EXPLOIT Supermicro BMC Password Disclosure 4; [1] |
15,663 | 2015/01/20 | 2018587 | ET EXPLOIT Supermicro BMC Password Disclosure 3; [1] |
15,662 | 2015/01/20 | 2018586 | ET EXPLOIT Supermicro BMC Password Disclosure 2; [1] |
< 221 222 223 224 225 226 227 228 229 230 > |