시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
6,6112015/01/20 2008811  ET ACTIVEX MW6 DataMatrix DataMatrix.dll ActiveX Control Multiple Arbitrary File Overwrite; [1,2
6,6102015/01/20 2008810  ET ACTIVEX MW6 PDF417 MW6PDF417.dll ActiveX Control Multiple Arbitrary File Overwrite; [1,2
6,6092015/01/20 2008809  ET ACTIVEX MW6 Technologies Barcode ActiveX Barcode.dll Multiple Arbitrary File Overwrite; [1,2
6,6082015/01/20 2008808  ET TROJAN DNS Changer.bnm/Downloader.bnm Second CnC Channel Traffic; [1
6,6072015/01/20 2008807  ET TROJAN DNS Changer.bnm/Downloader.bnm Second CnC Channel Start; [1
6,6062015/01/20 2008806  ET TROJAN DNS Changer.bnm/Downloader.bnm CnC Channel Start Response; [1
6,6052015/01/20 2008805  ET TROJAN DNS Changer.bnm/Downloader.bnm CnC Channel Start; [1
6,6042015/01/20 2008802  ET DELETED Possible Downadup/Conficker-A Worm Activity; [1,2,3
6,6032015/01/20 2008798  ET MALWARE Zenosearch Malware Checkin HTTP POST (2); [1
6,6022015/01/20 2008797  ET TROJAN Suspicious User-Agent (miip); [1
6,6012015/01/20 2008795  ET POLICY TeamViewer Keep-alive inbound; [1,2,3
6,6002015/01/20 2008794  ET POLICY TeamViewer Keep-alive outbound; [1,2,3
6,5992015/01/20 2008793  ET WEB_SPECIFIC_APPS SFS EZ BIZ PRO track.php id Parameter Remote SQL Injection; [1,2,3
6,5982015/01/20 2008792  ET ACTIVEX Microsoft DebugDiag CrashHangExt.dll ActiveX Control Remote Denial of Service; [1
6,5972015/01/20 2008791  ET ACTIVEX Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite; [1,2
6,5962015/01/20 2008790  ET ACTIVEX DjVu DjVu_ActiveX_MSOffice.dll ActiveX Component Heap Buffer Overflow; [1,2
6,5952015/01/20 2008789  ET ACTIVEX DB Software Laboratory VImpX.ocx ActiveX Control Multiple Insecure Methods; [1,2
6,5942015/01/20 2008788  ET WEB_SPECIFIC_APPS e107 BLOG Engine macgurublog.php uid Parameter SQL Injection; [1,2
6,5932015/01/20 2008787  ET WEB_SPECIFIC_APPS All In One Control Panel poll_id parameter SQL Injection; [1,2,3
6,5922015/01/20 2008786  ET WEB_SPECIFIC_APPS PozScripts Classified Auctions id parameter SQL Injection; [1,2,3
6,5912015/01/20 2008785  ET WEB_SPECIFIC_APPS Aj Square RSS Reader url SQL Injection; [1,2,3
6,5902015/01/20 2008784  ET DELETED Lighty Variant or UltimateDefender POST; [1
6,5892015/01/20 2008783  ET DELETED Possible Trojan File Download - Rar Requested but not received; [1,2
6,5882015/01/20 2008782  ET POLICY Possible Trojan File Download bad rar file header (not a valid rar file); [1,2
6,5872015/01/20 2008781  ET DELETED Set flow on rar file get; [1
6,5862015/01/20 2008780  ET DELETED Unknown Keepalive in; [1
6,5852015/01/20 2008779  ET DELETED Unknown Keepalive out; [1
6,5842015/01/20 2008777  ET EXPLOIT GuildFTPd CWD and LIST Command Heap Overflow - POC-2; [1,2
6,5832015/01/20 2008776  ET EXPLOIT GuildFTPd CWD and LIST Command Heap Overflow - POC-1; [1,2
6,5822015/01/20 2008772  ET DELETED Unknown Trojan P2P Request; [1,2
6,5812015/01/20 2008771  ET DELETED Unknown Trojan P2P Download Request; [1,2
6,5802015/01/20 2008770  ET DELETED Unknown Trojan P2P Data Download; [1,2
6,5792015/01/20 2008767  ET TROJAN Kangkio User-Agent (lsosss); [1
6,5782015/01/20 2008766  ET DELETED Generic Downloader Checkin Url Detected; [1
6,5772015/01/20 2008765  ET TROJAN Brontok/Joseray User-Agent Detected (Joseray.A3 Browser); [1
6,5762015/01/20 2008760  ET TROJAN Insidebar.co.kr Related Infection Checkin; [1
6,5752015/01/20 2008759  ET MALWARE Matcash Trojan Related Spyware Code Download; [1
6,5742015/01/20 2008758  ET TROJAN Mcboo.com/Bundlext.com related Trojan Checkin URL; [1
6,5732015/01/20 2008757  ET MALWARE Zenosearch Malware Checkin HTTP POST; [1
6,5722015/01/20 2008756  ET TROJAN Suspicious User-Agent (Kvadrlson 1.0); [1
6,5712015/01/20 2008755  ET TROJAN Autorun.qvi Related HTTP Get on Off Port; [1
6,5702015/01/20 2008754  ET TROJAN Possible Rar'd Malware sent when remote host claims to send an Image; [1
6,5692015/01/20 2008753  ET MALWARE AdWare.Win32.Yokbar Checkin URL; [1
6,5682015/01/20 2008752  ET TROJAN AdWare.Win32.Yokbar User-Agent Detected (YOK Agent); [1
6,5672015/01/20 2008750  ET DELETED Buzus FTP Log Upload; [1
6,5662015/01/20 2008749  ET TROJAN Suspicious User-Agent (checkonline); [1
6,5652015/01/20 2008748  ET POLICY Possible External FreeGate DNS Query; [1
6,5642015/01/20 2008747  ET POLICY Possible External FreeGate DNS Query; [1
6,5632015/01/20 2008746  ET POLICY Possible External FreeGate DNS Query; [1
6,5622015/01/20 2008745  ET POLICY Possible External FreeGate DNS Query; [1
< 411  412  413  414  415  416  417  418  419  420 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.