번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
10,611 | 2015/01/20 | 2013285 | ET TROJAN DarkComet-RAT Client Keepalive; [1] |
10,610 | 2015/01/20 | 2013284 | ET TROJAN DarkComet-RAT server join acknowledgement; [1,2] |
10,609 | 2015/01/20 | 2013283 | ET TROJAN DarkComet-RAT init connection; [1,2] |
10,608 | 2015/01/20 | 2013282 | ET WEB_CLIENT Adobe Flash Player Button Remote Code Execution Attempt; |
10,607 | 2015/01/20 | 2013281 | ET WEB_CLIENT Adobe Authplay.dll NewClass Memory Corruption Attempt; [1] |
10,606 | 2015/01/20 | 2013280 | ET WEB_CLIENT Microsoft Word RTF pFragments Stack Overflow Attempt; [1] |
10,605 | 2015/01/20 | 2013279 | ET SHELLCODE Double BackSlash Hex Obfuscated JavaScript Heap Spray 41414141; [1] |
10,604 | 2015/01/20 | 2013278 | ET SHELLCODE Double BackSlash Hex Obfuscated JavaScript NOP SLED; [1] |
10,603 | 2015/01/20 | 2013277 | ET SHELLCODE Double BackSlash Hex Obfuscated JavaScript Heap Spray 0d0d0d0d; [1] |
10,602 | 2015/01/20 | 2013276 | ET SHELLCODE Double BackSlash Hex Obfuscated JavaScript Heap Spray 0c0c0c0c; [1] |
10,601 | 2015/01/20 | 2013275 | ET SHELLCODE Double BackSlash Hex Obfuscated JavaScript Heap Spray 0b0b0b0b; [1] |
10,600 | 2015/01/20 | 2013274 | ET SHELLCODE Double BackSlash Hex Obfuscated JavaScript Heap Spray 0a0a0a0a; [1] |
10,599 | 2015/01/20 | 2013273 | ET SHELLCODE Hex Obfuscated JavaScript Heap Spray 41414141; [1] |
10,598 | 2015/01/20 | 2013272 | ET SHELLCODE Unescape Hex Obfuscated Content; |
10,597 | 2015/01/20 | 2013271 | ET SHELLCODE Hex Obfuscated JavaScript NOP SLED; [1] |
10,596 | 2015/01/20 | 2013270 | ET SHELLCODE Hex Obfuscated JavaScript Heap Spray 0d0d0d0d; [1] |
10,595 | 2015/01/20 | 2013269 | ET SHELLCODE Hex Obfuscated JavaScript Heap Spray 0c0c0c0c; [1] |
10,594 | 2015/01/20 | 2013268 | ET SHELLCODE Hex Obfuscated JavaScript Heap Spray 0b0b0b0b; [1] |
10,593 | 2015/01/20 | 2013267 | ET SHELLCODE Hex Obfuscated JavaScript Heap Spray 0a0a0a0a; [1] |
10,592 | 2015/01/20 | 2013266 | ET MOBILE_MALWARE SymbOS/SymGam Receiving SMS Message Template from CnC Server; [1] |
10,591 | 2015/01/20 | 2013265 | ET MOBILE_MALWARE SymbOS/SymGam CnC Checkin; [1] |
10,590 | 2015/01/20 | 2013264 | ET SCAN Nessus FTP Scan detected (ftp_writeable_directories.nasl); [1,2] |
10,589 | 2015/01/20 | 2013263 | ET SCAN Nessus FTP Scan detected (ftp_anonymous.nasl); [1,2] |
10,588 | 2015/01/20 | 2013261 | ET MOBILE_MALWARE SymbOS/CommDN Downloading Second Stage Malware Binary; [1] |
10,587 | 2015/01/20 | 2013260 | ET TROJAN Win32/Nekill Checkin; [1] |
10,586 | 2015/01/20 | 2013259 | ET TROJAN Guagua Trojan Update Checkin; |
10,585 | 2015/01/20 | 2013258 | ET USER_AGENTS Avzhan DDoS Bot User-Agent MyIE; [1,2] |
10,584 | 2015/01/20 | 2013256 | ET TROJAN Majestic12 User-Agent Request Outbound; |
10,583 | 2015/01/20 | 2013255 | ET POLICY Majestic12 User-Agent Request Inbound; |
10,582 | 2015/01/20 | 2013254 | ET TROJAN Yandexbot Request Outbound; |
10,581 | 2015/01/20 | 2013253 | ET POLICY Yandexbot Request Inbound; |
10,580 | 2015/01/20 | 2013252 | ET WEB_CLIENT Microsoft Internet Explorer Time Element Uninitialized Memory Remote Code Execution Attempt; [1] |
10,579 | 2015/01/20 | 2013251 | ET WEB_CLIENT Known in Wild Microsoft Internet Explorer Time Element Uninitialized Memory Remote Code Execution Attempt; [1] |
10,578 | 2015/01/20 | 2013250 | ET WEB_CLIENT Microsoft Word RTF pFragments Stack Buffer Overflow Attempt; [1] |
10,577 | 2015/01/20 | 2013249 | ET SCAN Vega Web Application Scan; [1,2] |
10,576 | 2015/01/20 | 2013248 | ET DELETED HTTP Request to a *.uni.cc domain; |
10,575 | 2015/01/20 | 2013247 | ET TROJAN Ruskill/Palevo KCIK IRC Command; [1,2] |
10,574 | 2015/01/20 | 2013246 | ET TROJAN Ruskill/Palevo CnC PONG; [1,2] |
10,573 | 2015/01/20 | 2013245 | ET TROJAN Ruskill/Palevo Download Command; [1,2] |
10,572 | 2015/01/20 | 2013244 | ET CURRENT_EVENTS Known Injected Credit Card Fraud Malvertisement Script; [1] |
10,571 | 2015/01/20 | 2013243 | ET MALWARE SweetIM Install in Progress; |
10,570 | 2015/01/20 | 2013242 | ET DELETED HTTP Request to a Suspicious *.cu.cc domain; |
10,569 | 2015/01/20 | 2013241 | ET MOBILE_MALWARE Android/GoldDream Uploading Watch Files; [1] |
10,568 | 2015/01/20 | 2013240 | ET MOBILE_MALWARE Android/GoldDream Task Information Retrieval; [1] |
10,567 | 2015/01/20 | 2013238 | ET MOBILE_MALWARE Android/GoldDream Infected Device Registration; [1] |
10,566 | 2015/01/20 | 2013237 | ET CURRENT_EVENTS Obfuscated Javascript Often Used in Drivebys; |
10,565 | 2015/01/20 | 2013236 | ET TROJAN Palevo (OUTBOUND); [1] |
10,564 | 2015/01/20 | 2013235 | ET SCADA Golden FTP Server PASS Command Remote Buffer Overflow Attempt; |
10,563 | 2015/01/20 | 2013234 | ET WEB_SPECIFIC_APPS ActivDesk cid Parameter Blind SQL Injection Attempt; [1] |
10,562 | 2015/01/20 | 2013233 | ET ACTIVEX Chilkat Crypt ActiveX Control SaveDecrypted Insecure Method Vulnerability; |
< 331 332 333 334 335 336 337 338 339 340 > |