시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
6,4112015/01/20 2008575  ET POLICY ASProtect/ASPack Packed Binary; [1,2,3
6,4102015/01/20 2008573  ET TROJAN Viruscatch.co.kr/Win32.Small.hvd Mysql Command and Control Connection (user viruscatch); [1
6,4092015/01/20 2008572  ET POLICY External MYSQL Server Connection; [1
6,4082015/01/20 2008571  ET SCAN Acunetix Version 6 Crawl/Scan Detected; [1,2
6,4072015/01/20 2008570  ET POLICY External Unencrypted Connection to BASE Console; [1,2
6,4062015/01/20 2008569  ET POLICY External Unencrypted Connection to Ossec WUI; [1,2
6,4052015/01/20 2008568  ET SCAN Voiper Toolkit Torturer Scan; [1,2
6,4042015/01/20 2008567  ET TROJAN Win32.Crypt.nc Checkin; [1
6,4032015/01/20 2008564  ET TROJAN Suspicious User-Agent (Internet HTTP Request); [1
6,4022015/01/20 2008563  ET TROJAN Suspicious SMTP handshake reply; [1
6,4012015/01/20 2008562  ET TROJAN Suspicious SMTP handshake outbound; [1
6,4002015/01/20 2008561  ET POLICY External Unencrypted Connection To Aanval Console; [1,2
6,3992015/01/20 2008560  ET SCAN NNG MS02-039 Exploit False Positive Generator - May Conceal A Genuine Attack; [1,2
6,3982015/01/20 2008559  ET ATTACK_RESPONSE Windows LMHosts File Download - Likely DNSChanger Infection; [1
6,3972015/01/20 2008558  ET MALWARE iwin.com Games/Spyware User-Agent (iWin GameInfo Installer Helper); [1
6,3962015/01/20 2008557  ET DELETED Likely EXE Cryptor Packed Binary - Likely Malware; [1,2
6,3952015/01/20 2008556  ET ATTACK_RESPONSE FTP CWD to windows system32 - Suspicious; [1
6,3942015/01/20 2008551  ET TROJAN Banito/Agent.pb Pass Stealer Email Report Outbound; [1
6,3932015/01/20 2008550  ET TROJAN Trojan.Win32.Buzus Checkin; [1
6,3922015/01/20 2008549  ET MALWARE Systemdoctor.com/Antivir2008 related Fake Anti-Virus User-Agent (AntivirXP); [1,2
6,3912015/01/20 2008547  ET TROJAN PECompact2 Packed Binary - Sometimes Hostile; [1,2,3
6,3902015/01/20 2008546  ET DELETED Emo/Downloader.vr Checkin; [1,2
6,3892015/01/20 2008545  ET TROJAN Social-bos.biz related trojan checkin (trackid=hex); [1
6,3882015/01/20 2008544  ET TROJAN Suspicious User-Agent (winlogon); [1
6,3872015/01/20 2008543  ET POLICY Known SSL traffic on port 995 (imaps) being excluded from SSL Alerts; [1
6,3862015/01/20 2008542  ET SCADA CitectSCADA ODBC Overflowflow Attempt; [1,2
6,3852015/01/20 2008541  ET TROJAN Bravix Checkin; [1
6,3842015/01/20 2008540  ET TROJAN Hupigon.dkxh Checkin to CnC; [1
6,3832015/01/20 2008538  ET SCAN Sqlmap SQL Injection Scan; [1,2
6,3822015/01/20 2008537  ET SCAN Hmap Webserver Fingerprint Scan; [1,2
6,3812015/01/20 2008536  ET DELETED Halberd Load Balanced Webserver Detection Scan; [1,2
6,3802015/01/20 2008533  ET DELETED Possible External Ultrasurf Anonymizer DNS Query; [1
6,3792015/01/20 2008532  ET DELETED Bifrose Connect to Controller (variant 2); [1
6,3782015/01/20 2008531  ET TROJAN Infected System Looking up chr.santa-inbox.com CnC Server; [1
6,3772015/01/20 2008529  ET SCAN Core-Project Scanning Bot UA Detected;  
6,3762015/01/20 2008527  ET TROJAN Virusremover2008.com Checkin; [1
6,3752015/01/20 2008526  ET SCAN Smap VOIP Device Scan; [1,2
6,3742015/01/20 2008525  ET DELETED Packetstormsecurity Exploits Of The Month Download; [1,2
6,3732015/01/20 2008524  ET DELETED Milw0rm Exploit Archive Download; [1,2
6,3722015/01/20 2008523  ET TROJAN Proxy.Win32.Fackemo.g/Katusha/FakeAlert Checkin; [1
6,3712015/01/20 2008522  ET TROJAN Stpage Checkin (nomodem); [1
6,3702015/01/20 2008521  ET TROJAN Keylogger Infection Report via POST; [1
6,3692015/01/20 2008520  ET DELETED Sinowal/Mebroot/Torpig Client POST; [1
6,3682015/01/20 2008519  ET TROJAN Win32.Agent.zrm/Infostealer.Bancos Checkin; [1
6,3672015/01/20 2008518  ET EXPLOIT SQL sp_configure attempt; [1,2
6,3662015/01/20 2008517  ET EXPLOIT SQL sp_configure - configuration change; [1,2
6,3652015/01/20 2008516  ET DELETED XPantivirus2008 Download; [1,2,3,4
6,3642015/01/20 2008515  ET TROJAN Hupigon.AZG Checkin; [1,2,3
6,3632015/01/20 2008514  ET TROJAN Suspicious User-Agent (AVP2006IE); [1
6,3622015/01/20 2008513  ET TROJAN Suspicious User-Agent (msIE 7.0); [1
< 411  412  413  414  415  416  417  418  419  420 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.