시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
15,3112015/01/20 2018220  ET INFO DYNAMIC_DNS HTTP Request to a *.ddns.info Domain;  
15,3102015/01/20 2018219  ET INFO DYNAMIC_DNS HTTP Request to a *.sytes.net Domain;  
15,3092015/01/20 2018218  ET INFO HTTP Connection To DDNS Domain myftp.com; [1
15,3082015/01/20 2018217  ET INFO HTTP Connection To DDNS Domain serveblog.net; [1
15,3072015/01/20 2018216  ET INFO HTTP Connection To DDNS Domain Hopto.org; [1,2
15,3062015/01/20 2018215  ET INFO HTTP Connection To DDNS Domain Zapto.org; [1,2
15,3052015/01/20 2018214  ET INFO HTTP Connection To DDNS Domain Redirectme.net; [1,2
15,3042015/01/20 2018213  ET INFO HTTP Connection To DDNS Domain Myvnc.com; [1,2
15,3032015/01/20 2018212  ET INFO HTTP Connection To DDNS Domain Servehttp.com; [1,2
15,3022015/01/20 2018211  ET INFO HTTP Connection To DDNS Domain Adultdns.net; [1,2
15,3012015/01/20 2018210  ET POLICY W32/Installiq.Adware Install Information Beacon;  
15,3002015/01/20 2018209  ET CURRENT_EVENTS Rawin EK Java fakav.jar;  
15,2992015/01/20 2018208  ET DOS Inbound GoldenEye DoS attack; [1
15,2982015/01/20 2018207  ET CURRENT_EVENTS LightsOut EK Exploit/Payload Request; [1
15,2972015/01/20 2018206  ET CURRENT_EVENTS Hello/LightsOut EK Secondary Landing; [1,2
15,2962015/01/20 2018205  ET TROJAN Win32/Kryptik.BSYO Checkin; [1
15,2952015/01/20 2018204  ET TROJAN W32/Qakbot.Bot Version 8 CnC Beacon; [1
15,2942015/01/20 2018203  ET WEB_SERVER log4jAdmin access from non-local network Page Body (can modify logging levels); [1
15,2932015/01/20 2018202  ET WEB_SERVER log4jAdmin access from non-local network (can modify logging levels); [1
15,2922015/01/20 2018201  ET TROJAN Downloader.Win32.Geral Checkin;  
15,2912015/01/20 2018200  ET TROJAN Win32/Matsnu.L Checkin; [1
15,2902015/01/20 2018198  ET TROJAN Win32/Kryptik.BSYO Checkin 2; [1
15,2892015/01/20 2018197  ET MALWARE Win32.AdWare.iBryte.C Install;  
15,2882015/01/20 2018196  ET CURRENT_EVENTS Malicious Spam Redirection Feb 28 2014;  
15,2872015/01/20 2018195  ET MALWARE BetterInstaller;  
15,2862015/01/20 2018194  ET MALWARE Adware.iBryte.B Install;  
15,2852015/01/20 2018193  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 30; [1,2
15,2842015/01/20 2018191  ET CURRENT_EVENTS SUSPICIOUS .exe Downloaded from SVN/HTTP on GoogleCode;  
15,2832015/01/20 2018190  ET CURRENT_EVENTS Possible FakeAV .exe.vbe HTTP Content-Disposition; [1
15,2822015/01/20 2018189  ET TROJAN Backdoor.joggver backdoor initialization packet;  
15,2812015/01/20 2018188  ET TROJAN W32/FakeFlash.Dropper GetInformation CnC Beacon Acknowledgement;  
15,2802015/01/20 2018187  ET TROJAN W32/FakeFlash.Dropper PutInformation CnC Beacon;  
15,2792015/01/20 2018186  ET TROJAN W32/FakeFlash.Dropper Initial CnC Beacon Acknowledgement;  
15,2782015/01/20 2018185  ET TROJAN W32/FakeFlash.Dropper Initial CnC Beacon;  
15,2772015/01/20 2018184  ET TROJAN Zeus.Downloader Campaign Second Stage Executable Request;  
15,2762015/01/20 2018183  ET TROJAN Zeus.Downloader Campaign Unknown Initial CnC Beacon;  
15,2752015/01/20 2018182  ET TROJAN Zeus Spam Campaign pdf.exe In ZIP - 26th Feb 2014;  
15,2742015/01/20 2018181  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 29; [1,2
15,2732015/01/20 2018180  ET DELETED Android FakeInst.BX checkin;  
15,2722015/01/20 2018179  ET CURRENT_EVENTS Obfuscation Technique Used in CVE-2014-0322 Attacks;  
15,2712015/01/20 2018178  ET CURRENT_EVENTS OnClick Anti-BOT TDS Hidden Form Feb 25 2014;  
15,2702015/01/20 2018177  ET CURRENT_EVENTS OnClick Anti-BOT TDS POST Feb 25 2014;  
15,2692015/01/20 2018176  ET WEB_SPECIFIC_APPS Symantec Endpoint Manager XXE RCE Attempt; [1
15,2682015/01/20 2018175  ET CURRENT_EVENTS SUSPICIOUS XXTEA UTF-16 Encoded HTTP Response;  
15,2672015/01/20 2018174  ET MALWARE RelevantKnowledge Adware CnC Beacon;  
15,2662015/01/20 2018172  ET CURRENT_EVENTS SUSPICIOUS Java Lang Runtime in Response;  
15,2652015/01/20 2018171  ET CURRENT_EVENTS Angler Landing Page Feb 24 2014;  
15,2642015/01/20 2018170  ET POLICY Application Crash Report Sent to Microsoft;  
15,2632015/01/20 2018169  ET TROJAN Gulpix/PlugX Client Request; [1
15,2622015/01/20 2018168  ET WEB_SPECIFIC_APPS MediaWiki thumb.php RCE; [1
< 231  232  233  234  235  236  237  238  239  240 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.