시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
14,7612015/01/20 2017661  ET CURRENT_EVENTS Possible Redirect to Neutrino goi.php Nov 4 2013;  
14,7602015/01/20 2017660  ET CURRENT_EVENTS Malicious Cookie Set By Flash Malvertising;  
14,7592015/01/20 2017659  ET DELETED Unknown Trojan Download;  
14,7582015/01/20 2017658  ET DELETED Unknown Trojan Secondary Download;  
14,7572015/01/20 2017657  ET WEB_CLIENT SUSPICIOUS JS Multiple Debug Math.atan2 calls with CollectGarbage; [1,2
14,7562015/01/20 2017656  ET TROJAN W32/InstallMonster.Downloader Checkin;  
14,7552015/01/20 2017655  ET TROJAN W32/Badur.Spy User Agent lawl;  
14,7542015/01/20 2017654  ET DELETED W32/Badur.Spy User Agent HWMPro;  
14,7532015/01/20 2017653  ET CURRENT_EVENTS Possible Neutrino Java Exploit/Payload Download Nov 1 2013; [1
14,7522015/01/20 2017652  ET CURRENT_EVENTS Possible Neutrino EK Landing URI Format Nov 1 2013;  
14,7512015/01/20 2017650  ET CURRENT_EVENTS SofosFO/Grandsoft Plugin-Detect;  
14,7502015/01/20 2017649  ET CURRENT_EVENTS Sweet Orange encrypted payload;  
14,7492015/01/20 2017648  ET CURRENT_EVENTS Possible Sweet Orange payload Request;  
14,7482015/01/20 2017647  ET TROJAN FakeAV Install;  
14,7472015/01/20 2017646  ET TROJAN possible TRAT proxy component user agent detected; [1
14,7462015/01/20 2017645  ET CURRENT_EVENTS DNS Query Domain .bit; [1
14,7452015/01/20 2017644  ET CURRENT_EVENTS Host Domain .bit; [1
14,7442015/01/20 2017643  ET TROJAN Linux/Ssemgrvd sshd Backdoor HTTP CNC 2;  
14,7432015/01/20 2017642  ET TROJAN Linux/Ssemgrvd sshd Backdoor HTTP CNC 1;  
14,7422015/01/20 2017641  ET WEB_SERVER Possible Encrypted Webshell in POST; [1
14,7412015/01/20 2017640  ET WEB_SERVER Possible Encrypted Webshell Download; [1
14,7402015/01/20 2017639  ET INFO JAR Size Under 30K Size - Potentially Hostile;  
14,7392015/01/20 2017638  ET CURRENT_EVENTS Alpha Networks ADSL2/2 router remote administration password disclosure; [1
14,7382015/01/20 2017637  ET INFO Java File Sent With X-Powered By HTTP Header - Common In Exploit Kits;  
14,7372015/01/20 2017636  ET CURRENT_EVENTS Nuclear EK PDF URI Struct;  
14,7362015/01/20 2017635  ET CURRENT_EVENTS Styx Landing Page Oct 25 2013;  
14,7352015/01/20 2017634  ET CURRENT_EVENTS Sweet Orange Landing Page Oct 25 2013;  
14,7342015/01/20 2017633  ET TROJAN Athena DDoS Bot Checkin;  
14,7332015/01/20 2017632  ET CURRENT_EVENTS Netgear WNDR3700 Auth Bypass; [1
14,7322015/01/20 2017631  ET CURRENT_EVENTS Netgear WNDR4700 Auth Bypass; [1
14,7312015/01/20 2017630  ET CURRENT_EVENTS Angler EK encrypted binary (1);  
14,7302015/01/20 2017629  ET CURRENT_EVENTS FlashPack Oct 23 2013;  
14,7292015/01/20 2017628  ET CURRENT_EVENTS Possible Sakura Jar Download Oct 22 2013;  
14,7282015/01/20 2017627  ET TROJAN W32/Kegotip CnC Beacon; [1,2
14,7272015/01/20 2017626  ET CURRENT_EVENTS 81a338 Hacked Site Response (Inbound);  
14,7262015/01/20 2017625  ET CURRENT_EVENTS 81a338 Hacked Site Response (Outbound);  
14,7252015/01/20 2017624  ET CURRENT_EVENTS Tenda Router Backdoor 2; [1
14,7242015/01/20 2017623  ET CURRENT_EVENTS Tenda Router Backdoor 1; [1
14,7232015/01/20 2017622  ET WEB_SPECIFIC_APPS WHMCS lt 5.2.8 SQL Injection; [1
14,7222015/01/20 2017621  ET CURRENT_EVENTS Possible Cutwail Redirect to Magnitude EK; [1
14,7212015/01/20 2017620  ET TROJAN Kuluoz Activity;  
14,7202015/01/20 2017617  ET TROJAN W32/Onkod.Downloader Executable Download; [1
14,7192015/01/20 2017616  ET SCAN NETWORK Incoming Masscan detected; [1,2
14,7182015/01/20 2017615  ET SCAN NETWORK Outgoing Masscan detected; [1,2
14,7172015/01/20 2017614  ET DELETED Kelihos p2p traffic detected via byte_test CnC Response;  
14,7162015/01/20 2017613  ET CURRENT_EVENTS Possible Magnitude EK (formerly Popads) IE Exploit with IE UA Oct 16 2013;  
14,7152015/01/20 2017612  ET DELETED Kelihos p2p traffic detected via byte_test - SET;  
14,7142015/01/20 2017611  ET WEB_SPECIFIC_APPS Oracle JSF2 Path Traversal Attempt; [1
14,7132015/01/20 2017610  ET DELETED vBulletin Administrator Injection Attempt; [1
14,7122015/01/20 2017609  ET WEB_SERVER PHP WebShell Embedded In PNG (INBOUND); [1
< 241  242  243  244  245  246  247  248  249  250 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.