|
|
|
번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 6,311 | 2015/01/20 | 2008446 | ET DNS Excessive DNS Responses with 1 or more RR's (100 in 10 seconds) - possible Cache Poisoning Attempt; [1] | 6,310 | 2015/01/20 | 2008445 | ET EXPLOIT Pwdump6 Session Established test file created on victim; [1,2] | 6,309 | 2015/01/20 | 2008444 | ET EXPLOIT PWDump4 Password dumping exe copied to victim; [1,2] | 6,308 | 2015/01/20 | 2008443 | ET TROJAN Coreflood/AFcore Trojan Infection (2); [1,2] | 6,307 | 2015/01/20 | 2008442 | ET TROJAN Rootkit.Win32.Clbd.cz Checkin; [1] | 6,306 | 2015/01/20 | 2008441 | ET TROJAN Win32 Dialer Variant; [1] | 6,305 | 2015/01/20 | 2008440 | ET TROJAN Suspicious User-Agent (Download App); [1] | 6,304 | 2015/01/20 | 2008439 | ET WEB_SPECIFIC_APPS AlstraSoft Affiliate Network Pro (pgm) Parameter SQL Injection; [1,2] | 6,303 | 2015/01/20 | 2008438 | ET MALWARE Possible Windows executable sent when remote host claims to send a Text File; [1] | 6,302 | 2015/01/20 | 2008437 | ET DELETED Win32.Testlink Trojan Checkin port 8888; [1] | 6,301 | 2015/01/20 | 2008436 | ET DELETED Win32.Testlink Trojan Speed Test port 8888; [1] | 6,300 | 2015/01/20 | 2008435 | ET DELETED Win32.Testlink Trojan Speed Test Start port 8888; [1] | 6,299 | 2015/01/20 | 2008434 | ET TROJAN Coreflood/AFcore Trojan Infection; [1,2] | 6,298 | 2015/01/20 | 2008433 | ET TROJAN Pandex checkin detected; [1] | 6,297 | 2015/01/20 | 2008431 | ET TROJAN PWS.Gamania Checkin; [1] | 6,296 | 2015/01/20 | 2008430 | ET TROJAN Win32.Dialer.buv Sending Information Home; [1] | 6,295 | 2015/01/20 | 2008429 | ET TROJAN Suspicious User-Agent (HttpDownload); [1] | 6,294 | 2015/01/20 | 2008428 | ET TROJAN Suspicious User-Agent (HTTP Downloader); [1] | 6,293 | 2015/01/20 | 2008427 | ET TROJAN Suspicious User-Agent (AdiseExplorer); [1] | 6,292 | 2015/01/20 | 2008426 | ET EXPLOIT SecurityGateway 1.0.1 Remote Buffer Overflow; [1,2,3] | 6,291 | 2015/01/20 | 2008425 | ET MALWARE Advert-network.com Related Spyware Checking for Updates; [1] | 6,290 | 2015/01/20 | 2008424 | ET TROJAN Suspicious User-Agent (CFS_DOWNLOAD); [1] | 6,289 | 2015/01/20 | 2008423 | ET TROJAN Suspicious User-Agent (CFS Agent); [1] | 6,288 | 2015/01/20 | 2008422 | ET TROJAN Suspicious User-Agent (Inet_read); [1] | 6,287 | 2015/01/20 | 2008420 | ET TROJAN HTTP GET Request on port 53 - Very Likely Hostile; [1] | 6,286 | 2015/01/20 | 2008419 | ET MALWARE Advert-network.com Related Spyware Updating; [1] | 6,285 | 2015/01/20 | 2008418 | ET POLICY Metasploit Framework Update; [1,2,3] | 6,284 | 2015/01/20 | 2008417 | ET SCAN Wapiti Web Server Vulnerability Scan; [1,2] | 6,283 | 2015/01/20 | 2008416 | ET SCAN Httprint Web Server Fingerprint Scan; [1,2,3] | 6,282 | 2015/01/20 | 2008415 | ET SCAN Cisco Torch IOS HTTP Scan; [1,2,3] | 6,281 | 2015/01/20 | 2008414 | ET SCAN Cisco Torch TFTP Scan; [1,2,3] | 6,280 | 2015/01/20 | 2008413 | ET TROJAN Suspicious User-Agent (PcPcUpdater); [1] | 6,279 | 2015/01/20 | 2008412 | ET TROJAN Trojan-Dropper.Win32.Small.avu HTTP Checkin; [1] | 6,278 | 2015/01/20 | 2008411 | ET TROJAN LDPinch SMTP Password Report with mail client The Bat!; [1] | 6,277 | 2015/01/20 | 2008409 | ET ACTIVEX Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download (3); [1,2,3] | 6,276 | 2015/01/20 | 2008408 | ET ACTIVEX Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download (2); [1,2,3] | 6,275 | 2015/01/20 | 2008407 | ET ACTIVEX Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download (1); [1,2,3] | 6,274 | 2015/01/20 | 2008406 | ET POLICY RemoteSpy.com Upload Detect; [1] | 6,273 | 2015/01/20 | 2008405 | ET TROJAN Obitel trojan calling home; [1,2] | 6,272 | 2015/01/20 | 2008402 | ET MALWARE Realtimegaming.com Online Casino Spyware Gaming Checkin; [1] | 6,271 | 2015/01/20 | 2008400 | ET TROJAN Suspicious User-Agent (ReadFileURL); [1] | 6,270 | 2015/01/20 | 2008399 | ET TROJAN contacy.info Trojan Checkin (User agent clk_jdfhid); [1] | 6,269 | 2015/01/20 | 2008398 | ET TROJAN Fullspace.cc or Related Checkin (2); [1] | 6,268 | 2015/01/20 | 2008397 | ET TROJAN Fullspace.cc or Related Checkin (1); [1] | 6,267 | 2015/01/20 | 2008396 | ET TROJAN Zlob Initial Check-in Version 2 (confirm.php?sid=); [1] | 6,266 | 2015/01/20 | 2008395 | ET TROJAN 3alupKo/Win32.Socks.n Related Checkin URL (3); [1] | 6,265 | 2015/01/20 | 2008393 | ET TROJAN 3alupKo/Win32.Socks.n Related Checkin URL (2); [1] | 6,264 | 2015/01/20 | 2008391 | ET TROJAN Suspicious User-Agent (svchost); [1] | 6,263 | 2015/01/20 | 2008390 | ET DELETED Hupigon Response from Controller (YES - ~~@@); [1,2] | 6,262 | 2015/01/20 | 2008389 | ET DELETED Likely Hupigon Post to Controller; [1,2] | < 411 412 413 414 415 416 417 418 419 420 > |
|
Copyright ⓒ 2010 . All Rights Reserved.
|
|