시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
15,4112015/01/20 2018323  ET MALWARE W32/Linkular.Adware Successful Install Beacon (2); [1
15,4102015/01/20 2018322  ET CURRENT_EVENTS Captcha Malware C2 SSL Certificate; [1
15,4092015/01/20 2018321  ET TROJAN Win32/Zegost UA; [1
15,4082015/01/20 2018320  ET TROJAN Win32/Sisproc; [1
15,4072015/01/20 2018319  ET CURRENT_EVENTS Upatre SSL Compromised site trudeausociety;  
15,4062015/01/20 2018318  ET SCAN NMAP SIP Version Detection Script Activity;  
15,4052015/01/20 2018317  ET SCAN NMAP SIP Version Detect OPTIONS Scan;  
15,4042015/01/20 2018316  ET TROJAN Zeus GameOver Possible DGA NXDOMAIN Responses; [1
15,4032015/01/20 2018315  ET WEB_CLIENT Microsoft Rich Text File .RTF File download with invalid listoverridecount;  
15,4022015/01/20 2018314  ET CURRENT_EVENTS Possible CVE-2014-1761 Inbound SMTP 1; [1
15,4012015/01/20 2018313  ET WEB_CLIENT Possible CVE-2014-1761 HTTP; [1
15,4002015/01/20 2018312  ET CURRENT_EVENTS Possible CVE-2014-1761 Inbound SMTP 6; [1
15,3992015/01/20 2018311  ET CURRENT_EVENTS Possible CVE-2014-1761 Inbound SMTP 5; [1
15,3982015/01/20 2018310  ET CURRENT_EVENTS Possible CVE-2014-1761 Inbound SMTP 4; [1
15,3972015/01/20 2018309  ET CURRENT_EVENTS Possible CVE-2014-1761 Inbound SMTP 3; [1
15,3962015/01/20 2018308  ET CURRENT_EVENTS Possible CVE-2014-1761 Inbound SMTP 2; [1
15,3952015/01/20 2018307  ET MALWARE AdWare.Win32.Yotoon.hs Checkin;  
15,3942015/01/20 2018306  ET MOBILE_MALWARE SMSSend Fake flappy bird APK; [1
15,3932015/01/20 2018305  ET CURRENT_EVENTS PHISH iTunes - PII Phished;  
15,3922015/01/20 2018304  ET CURRENT_EVENTS PHISH iTunes - Creds Phished;  
15,3912015/01/20 2018303  ET CURRENT_EVENTS PHISH iTunes - Landing Page - Title over non SSL;  
15,3902015/01/20 2018302  ET CURRENT_EVENTS PHISH Generic - Landing Page - HTTrack comment and form;  
15,3892015/01/20 2018301  ET MALWARE Win32/Toolbar.CrossRider.A Checkin;  
15,3882015/01/20 2018300  ET TROJAN Win32/Stoberox.B;  
15,3872015/01/20 2018299  ET WEB_CLIENT Generic HeapSpray Construct;  
15,3862015/01/20 2018298  ET CURRENT_EVENTS GoonEK Landing Mar 20 2014;  
15,3852015/01/20 2018297  ET CURRENT_EVENTS GoonEK encrypted binary (3);  
15,3842015/01/20 2018296  ET TROJAN Zeus GameOver Checkin;  
15,3832015/01/20 2018295  ET TROJAN Mal/Ransom-CE Connectivity Check;  
15,3822015/01/20 2018294  ET TROJAN MultiThreat/Winspy.RAT FTP File Download Command; [1
15,3812015/01/20 2018293  ET TROJAN MultiThreat/Winspy.RAT SMTP Data Exfiltration; [1
15,3802015/01/20 2018292  ET TROJAN MultiThreat/Winspy.RAT Keep-Alive Server Response; [1
15,3792015/01/20 2018291  ET TROJAN MultiThreat/Winspy.RAT Keep-Alive (flowbit set); [1
15,3782015/01/20 2018290  ET WEB_SERVER WEBSHELL CFM Shell Access; [1
15,3772015/01/20 2018289  ET CURRENT_EVENTS Joomla 3.2.1 SQL injection attempt 2; [1
15,3762015/01/20 2018288  ET CURRENT_EVENTS Joomla 3.2.1 SQL injection attempt; [1
15,3752015/01/20 2018287  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 31; [1,2
15,3742015/01/20 2018286  ET CURRENT_EVENTS EMET.DLL in jjencode;  
15,3732015/01/20 2018285  ET TROJAN BKDR_SLOTH.A Checkin; [1,2
15,3722015/01/20 2018284  ET TROJAN Self-Signed Cert Observed in Various Zbot Strains;  
15,3712015/01/20 2018283  ET TROJAN Possible Netwire RAT Client HeartBeat C2;  
15,3702015/01/20 2018282  ET TROJAN Possible Netwire RAT Client HeartBeat S1 (no alert);  
15,3692015/01/20 2018281  ET TROJAN Possible Netwire RAT Client HeartBeat C1 (no alert);  
15,3682015/01/20 2018279  ET CURRENT_EVENTS MtGox Leak wallet stealer UA; [1
15,3672015/01/20 2018277  ET DOS Possible WordPress Pingback DDoS in Progress (Inbound);  
15,3662015/01/20 2018276  ET TROJAN Linux/Onimiki DNS trojan activity long format (Inbound); [1,2
15,3652015/01/20 2018275  ET TROJAN Linux/Onimiki DNS trojan activity long format (Outbound); [1,2
15,3642015/01/20 2018274  ET TROJAN Perl/Calfbot C&C DNS request; [1,2
15,3632015/01/20 2018273  ET TROJAN Perl/Calfbot C&C DNS request; [1,2
15,3622015/01/20 2018272  ET TROJAN Perl/Calfbot C&C DNS request; [1,2
< 231  232  233  234  235  236  237  238  239  240 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.