시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
15,6112015/01/20 2018535  ET CURRENT_EVENTS CottonCastle EK Landing June 05 2014;  
15,6102015/01/20 2018534  ET CURRENT_EVENTS CottonCastle EK URI Struct;  
15,6092015/01/20 2018533  ET MOBILE_MALWARE Android.Adware.Wapsx.A;  
15,6082015/01/20 2018532  ET P2P zzima_loader;  
15,6072015/01/20 2018530  ET TROJAN Win32.Trojan.Agent.U3D7V0 Checkin;  
15,6062015/01/20 2018529  ET TROJAN Soraya C2 User-Agent (x09); [1
15,6052015/01/20 2018528  ET TROJAN Soraya C2 User-Agent (xehanort321); [1
15,6042015/01/20 2018527  ET TROJAN Soraya C2 User-Agent (VHIbot/1.0); [1
15,6032015/01/20 2018526  ET TROJAN Soraya C2 User-Agent (Vulture); [1
15,6022015/01/20 2018525  ET TROJAN Soraya C2 User-Agent (slayer); [1
15,6012015/01/20 2018524  ET TROJAN Soraya C2 User-Agent (SBTCM); [1
15,6002015/01/20 2018523  ET TROJAN Soraya C2 User-Agent (rhyno321); [1
15,5992015/01/20 2018522  ET TROJAN Soraya C2 User-Agent (default); [1
15,5982015/01/20 2018520  ET MOBILE_MALWARE AndroidOS/Lotoor.Q;  
15,5972015/01/20 2018519  ET TROJAN Soraya C2 User-Agent; [1
15,5962015/01/20 2018518  ET TROJAN Trojan.Win32.VBKrypt.cugq Checkin; [1,2,3,4
15,5952015/01/20 2018517  ET DNS Reply Sinkhole FBI Zeus P2P 1 - 142.0.36.234;  
15,5942015/01/20 2018516  ET TROJAN Win32/Spy.Banker.AAQD Checkin; [1
15,5932015/01/20 2018515  ET TROJAN SSL Cert Observed with Unkown Trojan (statswas);  
15,5922015/01/20 2018514  ET CURRENT_EVENTS Possible Malicious Injected Redirect June 02 2014;  
15,5912015/01/20 2018513  ET MALWARE PUP Win32/DownloadGuide.A;  
15,5902015/01/20 2018512  ET MALWARE Adware.MultiInstaller;  
15,5892015/01/20 2018511  ET TROJAN Angler EK encrypted binary (7);  
15,5882015/01/20 2018510  ET CURRENT_EVENTS Angler EK encrypted binary (6);  
15,5872015/01/20 2018509  ET CURRENT_EVENTS Angler EK encrypted binary (5);  
15,5862015/01/20 2018508  ET TROJAN Win32/Enosch.A gtalk connectivity check;  
15,5852015/01/20 2018507  ET TROJAN Trojan-Dropper.Win32.Agent.ksja;  
15,5842015/01/20 2018506  ET TROJAN Upatre Compromised Site hot-buys;  
15,5832015/01/20 2018505  ET DELETED food.com compromise hostile JavaScript gate;  
15,5822015/01/20 2018504  ET TROJAN W32/Zeus.BitcoinMiner Variant CnC Beacon; [1
15,5812015/01/20 2018503  ET CURRENT_EVENTS Gongda EK Landing 2;  
15,5802015/01/20 2018502  ET CURRENT_EVENTS Gongda EK Landing 1;  
15,5792015/01/20 2018501  ET CURRENT_EVENTS Gongda EK Secondary Landing;  
15,5782015/01/20 2018500  ET CURRENT_EVENTS Metasploit Various Java Exploit Common Class name;  
15,5772015/01/20 2018499  ET TROJAN Win32/Urausy.C response;  
15,5762015/01/20 2018498  ET CURRENT_EVENTS Possible Styx/Angler SilverLight Exploit 2;  
15,5752015/01/20 2018497  ET CURRENT_EVENTS Angler EK SilverLight Payload Request - May 2014; [1
15,5742015/01/20 2018496  ET TROJAN Win32/Geodo Checkin; [1
15,5732015/01/20 2018495  ET WEB_SERVER Possible CVE-2014-3120 Elastic Search Remote Code Execution Attempt; [1
15,5722015/01/20 2018494  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2); [1
15,5712015/01/20 2018493  ET CURRENT_EVENTS Sweet Orange WxH redirection;  
15,5702015/01/20 2018492  ET TROJAN Upatre SSL Cert May 20 2014;  
15,5692015/01/20 2018491  ET TROJAN MiniDuke Checkin; [1
15,5682015/01/20 2018490  ET CURRENT_EVENTS .gadget Email Attachment - Possible Upatre; [1
15,5672015/01/20 2018489  ET SCAN NMAP OS Detection Probe;  
15,5662015/01/20 2018488  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 35; [1,2
15,5652015/01/20 2018487  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 34; [1,2
15,5642015/01/20 2018486  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 33; [1,2
15,5632015/01/20 2018485  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 32; [1,2
15,5622015/01/20 2018484  ET TROJAN Possible Zendran ELF IRCBot Server Banner; [1,2
< 231  232  233  234  235  236  237  238  239  240 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.