시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
15,8612015/01/20 2018796  ET CURRENT_EVENTS Safe/CritX/FlashPack EK Plugin Detect Java Exploit;  
15,8602015/01/20 2018795  ET CURRENT_EVENTS Safe/CritX/FlashPack EK Plugin Detect IE Exploit;  
15,8592015/01/20 2018794  ET CURRENT_EVENTS Safe/CritX/FlashPack EK Secondary Landing June 28 2014;  
15,8582015/01/20 2018793  ET TROJAN EUPUDS.A Requests for Boleto replacement; [1
15,8572015/01/20 2018792  ET MOBILE_MALWARE Worm.AndroidOS.Selfmite.a Checkin; [1,2
15,8562015/01/20 2018791  ET CURRENT_EVENTS Possible Upatre SSL Cert 1stopmall.us;  
15,8552015/01/20 2018790  ET CURRENT_EVENTS Possible Upatre SSL Cert server.abaphome.net;  
15,8542015/01/20 2018789  ET POLICY TLS possible TOR SSL traffic;  
15,8532015/01/20 2018788  ET TROJAN Possible CryptoWall encrypted download;  
15,8522015/01/20 2018787  ET TROJAN Unknown Locker DL URI Struct Jul 25 2014;  
15,8512015/01/20 2018786  ET CURRENT_EVENTS Sweet Orange EK CDN Landing Page; [1
15,8502015/01/20 2018785  ET CURRENT_EVENTS Possible ShellCode Passed as Argument to FlashVars;  
15,8492015/01/20 2018784  ET TROJAN Win32/Neurevt Check-in 4;  
15,8482015/01/20 2018783  ET CURRENT_EVENTS Likely Evil XMLDOM Detection of Local File; [1
15,8472015/01/20 2018782  ET SCAN Internet Scanning Project HTTP scan; [1
15,8462015/01/20 2018781  ET MOBILE_MALWARE AndroidOS.Simplocker Checkin; [1
15,8452015/01/20 2018780  ET CURRENT_EVENTS Possible Upatre SSL Cert migsparkle.com;  
15,8442015/01/20 2018779  ET CURRENT_EVENTS Possible Upatre SSL Cert michaelswinecellar.com;  
15,8432015/01/20 2018778  ET CURRENT_EVENTS Possible Upatre SSL Cert yellowdevilgear.com;  
15,8422015/01/20 2018777  ET CURRENT_EVENTS Possible Upatre SSL Cert cactussports.com;  
15,8412015/01/20 2018776  ET CURRENT_EVENTS Possible Upatre SSL Cert thelabelnashville.com;  
15,8402015/01/20 2018775  ET TROJAN Dyreza RAT Fake Server Header;  
15,8392015/01/20 2018774  ET MOBILE_MALWARE Android ScarePakage checkin 2; [1,2
15,8382015/01/20 2018773  ET TROJAN Win32/Pykspa.C Public IP Check;  
15,8372015/01/20 2018772  ET TROJAN Dridex/Bugat/Feodo GET Checkin;  
15,8362015/01/20 2018771  ET TROJAN Dridex/Bugat/Feodo POST Checkin;  
15,8352015/01/20 2018770  ET TROJAN Dridex/Bugat/Feodo Cookie;  
15,8342015/01/20 2018769  ET MOBILE_MALWARE Android ScarePakage checkin; [1,2
15,8332015/01/20 2018768  ET TROJAN Likely Malicious SSL Cert With Script Tags;  
15,8322015/01/20 2018767  ET TROJAN Malicious SSL Cert (KINS C2);  
15,8312015/01/20 2018766  ET TROJAN DNS Query to Pseudo Random Domain for Web Malware (.mynumber.org); [1
15,8302015/01/20 2018765  ET TROJAN Win32/Swizzor User-Agent (Swizz03r);  
15,8292015/01/20 2018764  ET TROJAN W32/Zbot.Variant CnC Response;  
15,8282015/01/20 2018763  ET TROJAN Win.Trojan.Agent-29225 Checkin; [1
15,8272015/01/20 2018762  ET TROJAN Hupigon.DF Checkin;  
15,8262015/01/20 2018761  ET TROJAN XPSecurityCenter FakeAV Checkin;  
15,8252015/01/20 2018760  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (Vawtrak MITM); [1
15,8242015/01/20 2018759  ET TROJAN Possible Upatre Serial Number in SSL Cert;  
15,8232015/01/20 2018758  ET CURRENT_EVENTS Possible Upatre SSL Cert twitterbacklinks.com;  
15,8222015/01/20 2018757  ET CURRENT_EVENTS XMLDOM Check for Presence TrendMicro AV Observed in RIG EK; [1
15,8212015/01/20 2018756  ET CURRENT_EVENTS XMLDOM Check for Presence Kaspersky AV Observed in RIG EK; [1
15,8202015/01/20 2018755  ET SCAN Possible WordPress xmlrpc.php BruteForce in Progress; [1
15,8192015/01/20 2018754  ET SCAN Possible WordPress xmlrpc.php wp.getUsersBlogs Flowbit Set; [1
15,8182015/01/20 2018753  ET MALWARE W32/SearchSuite Install CnC Beacon;  
15,8172015/01/20 2018752  ET TROJAN Generic .bin download from Dotted Quad;  
15,8162015/01/20 2018751  ET CURRENT_EVENTS Possible Sweet Orange redirection 21 July 2014;  
15,8152015/01/20 2018750  ET TROJAN Win32/Ropest.A Checkin;  
15,8142015/01/20 2018749  ET TROJAN Dyreza RAT Checkin 3; [1
15,8132015/01/20 2018748  ET TROJAN PE downloaded malicious SSL certificate (CZ Solutions); [1
15,8122015/01/20 2018747  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2); [1
< 221  222  223  224  225  226  227  228  229  230 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.