번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
13,711 | 2015/01/20 | 2016580 | ET CURRENT_EVENTS SUSPICIOUS Java Request to DynDNS Pro Dynamic DNS Domain; |
13,710 | 2015/01/20 | 2016579 | ET TROJAN APT_NGO_wuaclt PDF file; [1] |
13,709 | 2015/01/20 | 2016578 | ET TROJAN Dorkbot Loader Payload Request; |
13,708 | 2015/01/20 | 2016577 | ET WEB_SERVER WebShell - Romanian Webshell; |
13,707 | 2015/01/20 | 2016576 | ET WEB_SERVER WebShell - MySQL Interface - Server Set Cookie mysql_web_admin*=; |
13,706 | 2015/01/20 | 2016575 | ET WEB_SERVER WebShell - MySQL Interface - Client Cookie mysql_web_admin*=; |
13,705 | 2015/01/20 | 2016574 | ET WEB_SERVER WebShell - MySQL Interface - Database List; |
13,704 | 2015/01/20 | 2016573 | ET TROJAN APT_NGO_wuaclt; [1] |
13,703 | 2015/01/20 | 2016572 | ET TROJAN APT_NGO_wuaclt C2 Check-in; [1] |
13,702 | 2015/01/20 | 2016571 | ET DNS APT_NGO_wuaclt C2 Domain hotmal1.com; [1] |
13,701 | 2015/01/20 | 2016570 | ET DNS APT_NGO_wuaclt C2 Domain micorsofts.com; [1] |
13,700 | 2015/01/20 | 2016569 | ET DNS APT_NGO_wuaclt C2 Domain micorsofts.net; [1] |
13,699 | 2015/01/20 | 2016568 | ET TROJAN W32/LetsGo.APT Sleep CnC Beacon; [1] |
13,698 | 2015/01/20 | 2016567 | ET TROJAN Win32/Urausy.C Checkin 2; |
13,697 | 2015/01/20 | 2016566 | ET CURRENT_EVENTS SNET EK Downloading Payload; |
13,696 | 2015/01/20 | 2016564 | ET CURRENT_EVENTS Blackhole 16-hex/q.php Jar Download; |
13,695 | 2015/01/20 | 2016563 | ET CURRENT_EVENTS Blackhole 16-hex/q.php Landing Page/Java exploit URI; |
13,694 | 2015/01/20 | 2016562 | ET CURRENT_EVENTS Possible Neutrino EK Posting Plugin-Detect Data; |
13,693 | 2015/01/20 | 2016561 | ET DELETED W32/Asprox Spam Module CnC Beacon; [1,2] |
13,692 | 2015/01/20 | 2016560 | ET CURRENT_EVENTS GonDadEK Plugin Detect March 11 2013; [1] |
13,691 | 2015/01/20 | 2016559 | ET CURRENT_EVENTS CoolEK Payload Download (7); |
13,690 | 2015/01/20 | 2016558 | ET CURRENT_EVENTS Possible CrimeBoss Generic URL Structure; |
13,689 | 2015/01/20 | 2016557 | ET DELETED Possible FiestaEK CVE-2013-0431 Artifact (4) Mar 07 2013; |
13,688 | 2015/01/20 | 2016556 | ET DELETED Possible FiestaEK CVE-2013-0431 Artifact (3) Mar 07 2013; |
13,687 | 2015/01/20 | 2016555 | ET DELETED Possible FiestaEK CVE-2013-0431 Artifact (2) Mar 07 2013; |
13,686 | 2015/01/20 | 2016554 | ET DELETED Possible FiestaEK CVE-2013-0431 Artifact (1) Mar 07 2013; |
13,685 | 2015/01/20 | 2016553 | ET TROJAN Win32/Urausy.C Checkin; |
13,684 | 2015/01/20 | 2016552 | ET TROJAN W32/Trustezeb.C CnC Beacon; [1,2] |
13,683 | 2015/01/20 | 2016551 | ET CURRENT_EVENTS Possible Neutrino EK Downloading Jar; |
13,682 | 2015/01/20 | 2016550 | ET TROJAN Win32/Fareit Checkin 2; |
13,681 | 2015/01/20 | 2016549 | ET CURRENT_EVENTS Base64 http argument in applet (Neutrino/Angler); |
13,680 | 2015/01/20 | 2016548 | ET DELETED W32/Ponik.Downloader Randomware Download; [1,2] |
13,679 | 2015/01/20 | 2016547 | ET CURRENT_EVENTS CoolEK Payload Download (6); |
13,678 | 2015/01/20 | 2016546 | ET MALWARE W32/Eorezo.Adware CnC Beacon; [1] |
13,677 | 2015/01/20 | 2016544 | ET DELETED Blackhole/Cool plugindetect in octal Mar 6 2013; |
13,676 | 2015/01/20 | 2016543 | ET CURRENT_EVENTS Possible Portal TDS Kit GET (2); [1] |
13,675 | 2015/01/20 | 2016542 | ET CURRENT_EVENTS Possible Portal TDS Kit GET; [1] |
13,674 | 2015/01/20 | 2016541 | ET CURRENT_EVENTS SofosFO/GrandSoft landing applet plus class Mar 03 2013; |
13,673 | 2015/01/20 | 2016540 | ET CURRENT_EVENTS SUSPICIOUS JAR Download by Java UA with non JAR EXT matches various EKs; |
13,672 | 2015/01/20 | 2016539 | ET CURRENT_EVENTS Java Download non Jar file; |
13,671 | 2015/01/20 | 2016538 | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download; |
13,670 | 2015/01/20 | 2016537 | ET INFO GET Minimal HTTP Headers Flowbit Set; |
13,669 | 2015/01/20 | 2016536 | ET TROJAN W32/TrojanSpy.MSIL Fetch Header CnC Beacon; [1] |
13,668 | 2015/01/20 | 2016535 | ET TROJAN W32/TrojanSpy.MSIL Set Done Day CnC Beacon; [1] |
13,667 | 2015/01/20 | 2016534 | ET TROJAN W32/TrojanSpy.MSIL Get New MAC CnC Beacon; [1] |
13,666 | 2015/01/20 | 2016533 | ET TROJAN W32/TrojanSpy.MSIL Fetch Time CnC Beacon; [1] |
13,665 | 2015/01/20 | 2016531 | ET TROJAN W32/Asprox.FakeAV Affiliate Download Location Response - Likely Pay-Per-Install For W32/Papras.Spy or W32/ZeroAccess; [1] |
13,664 | 2015/01/20 | 2016530 | ET TROJAN W32/Asprox.FakeAV Affiliate Second Stage Download Location Request; [1] |
13,663 | 2015/01/20 | 2016529 | ET TROJAN W32/Asprox Passgrub POST CnC Beacon; [1] |
13,662 | 2015/01/20 | 2016528 | ET TROJAN W32/Asprox CnC Beacon; [1] |
< 261 262 263 264 265 266 267 268 269 270 > |