시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
15,2612015/01/20 2018167  ET TROJAN Generic CnC;  
15,2602015/01/20 2018166  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 28; [1,2
15,2592015/01/20 2018165  ET TROJAN Gh0st Trojan CnC 3;  
15,2582015/01/20 2018164  ET TROJAN Ebury SSH Rootkit data exfiltration; [1
15,2572015/01/20 2018163  ET CURRENT_EVENTS GoonEK Landing Feb 19 2014 2;  
15,2562015/01/20 2018162  ET CURRENT_EVENTS Malicious Redirect Evernote Spam Campaign Feb 19 2014;  
15,2552015/01/20 2018161  ET CURRENT_EVENTS Possible GoonEK Landing Feb 19 2014 1;  
15,2542015/01/20 2018160  ET EXPLOIT Linksys Failed Upgrade BackDoor Access (Server Response); [1
15,2532015/01/20 2018159  ET EXPLOIT Linksys Auth Bypass switch_boot.cgi; [1
15,2522015/01/20 2018158  ET EXPLOIT Linksys Auth Bypass share_editor.cgi; [1
15,2512015/01/20 2018157  ET EXPLOIT Linksys Auth Bypass override.cgi; [1
15,2502015/01/20 2018156  ET EXPLOIT Linksys Auth Bypass fw_sys_up.cgi; [1
15,2492015/01/20 2018155  ET WORM TheMoon.linksys.router 3; [1,2,3
15,2482015/01/20 2018154  ET TROJAN Win32.Hack.PcClient.g CnC (OUTBOUND) XOR b5;  
15,2472015/01/20 2018153  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 27; [1,2
15,2462015/01/20 2018152  ET WEB_CLIENT EMET Detection Via XMLDOM;  
15,2452015/01/20 2018151  ET DELETED W32/Azbreg.Backdoor CnC Beacon;  
15,2442015/01/20 2018150  ET TROJAN W32/Dadobra.Downloader/DNSChanger Dnsmake CnC Beacon;  
15,2432015/01/20 2018149  ET MALWARE W32/InstallMonetizer.Adware Beacon 2;  
15,2422015/01/20 2018148  ET MALWARE W32/InstallMonetizer.Adware Beacon 1;  
15,2412015/01/20 2018147  ET WEB_CLIENT Possible IE10 Use After Free CVE-2014-0322;  
15,2402015/01/20 2018146  ET CURRENT_EVENTS Generic HeapSpray Construct;  
15,2392015/01/20 2018145  ET CURRENT_EVENTS Generic HeapSpray Construct;  
15,2382015/01/20 2018144  ET SMTP EXE - ZIP file with .pif filename inside;  
15,2372015/01/20 2018143  ET TROJAN Backdoor.Win32.Popwin Checkin; [1
15,2362015/01/20 2018142  ET TROJAN MSIL.Zapchast Checkin; [1
15,2352015/01/20 2018141  ET TROJAN Possible Compromised Host Sinkhole Cookie Value Snkz;  
15,2342015/01/20 2018140  ET MOBILE_MALWARE Android/FakeKakao checkin 3; [1
15,2332015/01/20 2018139  ET MOBILE_MALWARE Android/FakeKakao checkin 2; [1
15,2322015/01/20 2018138  ET MOBILE_MALWARE Android/FakeKakao checkin 1; [1
15,2312015/01/20 2018137  ET TROJAN Android/FakeKakao checkin; [1
15,2302015/01/20 2018136  ET CURRENT_EVENTS Linksys Router Returning Device Settings To External Source; [1
15,2292015/01/20 2018135  ET CURRENT_EVENTS Current Asprox Spam Campaign 2;  
15,2282015/01/20 2018134  ET TROJAN Win32/Tapazom.A 2;  
15,2272015/01/20 2018133  ET TROJAN Win32/Tapazom.A;  
15,2262015/01/20 2018132  ET WORM TheMoon.linksys.router 2; [1,2
15,2252015/01/20 2018131  ET WORM TheMoon.linksys.router 1; [1
15,2242015/01/20 2018130  ET TROJAN W32/Trojan-Gypikon Server Check-in Response;  
15,2232015/01/20 2018129  ET TROJAN W32/Trojan-Gypikon Sending Data;  
15,2222015/01/20 2018128  ET TROJAN Infostealer.Jackpos Checkin 2; [1
15,2212015/01/20 2018127  ET CURRENT_EVENTS Goon EK Java JNLP URI Struct Feb 12 2014;  
15,2202015/01/20 2018126  ET CURRENT_EVENTS SUSPICIOUS .CPL File Inside of Zip;  
15,2192015/01/20 2018125  ET CURRENT_EVENTS SUSPICIOUS .PIF File Inside of Zip;  
15,2182015/01/20 2018124  ET TROJAN MS Remote Desktop micros User Login Request; [1
15,2172015/01/20 2018123  ET TROJAN Win32/Almanahe.B Checkin; [1
15,2162015/01/20 2018122  ET TROJAN Linkup Ransomware check-in; [1
15,2152015/01/20 2018121  ET TROJAN Onkods.A Downloader Checkin;  
15,2142015/01/20 2018120  ET TROJAN Blackbeard Check-in; [1
15,2132015/01/20 2018119  ET TROJAN Banking Trojan HTTP Cookie; [1
15,2122015/01/20 2018118  ET WEB_SERVER Recon-ng User-Agent; [1
< 231  232  233  234  235  236  237  238  239  240 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.