시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,6612015/01/20 2012314  ET TROJAN Rootkit TDSS/Alureon Checkin 2; [1
9,6602015/01/20 2012313  ET USER_AGENTS Suspicious User-Agent Moxilla;  
9,6592015/01/20 2012312  ET TROJAN Generic Trojan with /? and Indy Library User-Agent;  
9,6582015/01/20 2012311  ET DELETED W32.SillyP2P Checkin; [1,2
9,6572015/01/20 2012310  ET TROJAN Si25f_302 User-Agent;  
9,6562015/01/20 2012309  ET TROJAN Night Dragon Server Auth to Bot; [1
9,6552015/01/20 2012308  ET TROJAN Night Dragon Dropper Download Command; [1
9,6542015/01/20 2012307  ET TROJAN Night Dragon CMD Shell; [1
9,6532015/01/20 2012306  ET TROJAN Night Dragon CnC Traffic Outbound 2; [1
9,6522015/01/20 2012305  ET TROJAN Night Dragon CnC Traffic Inbound 2; [1
9,6512015/01/20 2012304  ET TROJAN Night Dragon CnC Beacon Inbound; [1
9,6502015/01/20 2012303  ET TROJAN Night Dragon CnC Beacon Outbound; [1
9,6492015/01/20 2012302  ET DELETED Potential Fake AV Scan (AS31252); [1
9,6482015/01/20 2012301  ET DELETED Potential Trojan dropper Wlock.A (AS1680); [1
9,6472015/01/20 2012300  ET TROJAN Win32.Banker.AAD CnC Communication; [1
9,6462015/01/20 2012299  ET TROJAN W32 Bamital or Backdoor.Win32.Shiz CnC Communication; [1
9,6452015/01/20 2012298  ET MALWARE User-Agent (0xa10xa1HttpClient);  
9,6442015/01/20 2012297  ET VOIP Possible Inbound VOIP Scan/Misuse With User-Agent Zoiper; [1
9,6432015/01/20 2012296  ET VOIP Modified Sipvicious Asterisk PBX User-Agent; [1
9,6422015/01/20 2012295  ET USER_AGENTS suspicious user-agent (REKOM);  
9,6412015/01/20 2012292  ET DELETED Base64 Encoded FTP Commands Upload (21 > o&echo user 1 1 >> o &echo get);  
9,6402015/01/20 2012291  ET DELETED Base64 Encoded FTP Commands (21 > o&echo user 1 1 >> o &echo get);  
9,6392015/01/20 2012290  ET TROJAN Spy.Win32.Agent.bijs Reporting 1; [1
9,6382015/01/20 2012289  ET TROJAN Win32 Troxen Reporting; [1,2
9,6372015/01/20 2012288  ET TROJAN Spy.Win32.Agent.bijs Reporting 2; [1
9,6362015/01/20 2012287  ET WEB_SERVER Automated Site Scanning for backup_data;  
9,6352015/01/20 2012286  ET WEB_SERVER Automated Site Scanning for backupdata;  
9,6342015/01/20 2012285  ET DELETED Trojan/Win32.CodecPack Reporting;  
9,6332015/01/20 2012284  ET TROJAN SpyEye Post_Express_Label ftpgrabber check-in; [1
9,6322015/01/20 2012283  ET DELETED SpyEye Post_Express_Label infection check-in; [1
9,6312015/01/20 2012282  ET DELETED SpyEye Post_Express_Label infection activity multi-stage download confirmed success; [1
9,6302015/01/20 2012281  ET DELETED SpyEye Post_Express_Label infection activity multi-stage download request; [1
9,6292015/01/20 2012280  ET DELETED SpyEye Post_Express_Label infection activity to document.doc; [1
9,6282015/01/20 2012279  ET TROJAN SpyEye HTTP Library Checkin; [1
9,6272015/01/20 2012278  ET USER_AGENTS Suspicious User-Agent (Our_Agent);  
9,6262015/01/20 2012276  ET TROJAN USPS Inbound SPAM;  
9,6252015/01/20 2012275  ET DELETED Post Express Inbound SPAM (possible Spyeye); [1
9,6242015/01/20 2012274  ET WEB_CLIENT Hex Obfuscation of eval %u UTF-16 Encoding; [1,2
9,6232015/01/20 2012273  ET WEB_CLIENT Hex Obfuscation of eval %u UTF-8 Encoding; [1,2
9,6222015/01/20 2012272  ET WEB_CLIENT Hex Obfuscation of eval % Encoding; [1,2
9,6212015/01/20 2012271  ET WEB_CLIENT Hex Obfuscation of substr %u UTF-16 Encoding; [1,2
9,6202015/01/20 2012270  ET WEB_CLIENT Hex Obfuscation of substr %u UTF-8 Encoding; [1,2
9,6192015/01/20 2012269  ET WEB_CLIENT Hex Obfuscation of substr % Encoding; [1,2
9,6182015/01/20 2012268  ET WEB_CLIENT Hex Obfuscation of unescape %u UTF-16 Encoding; [1,2
9,6172015/01/20 2012267  ET WEB_CLIENT Hex Obfuscation of unescape %u UTF-8 Encoding; [1,2
9,6162015/01/20 2012266  ET WEB_CLIENT Hex Obfuscation of unescape % Encoding; [1,2
9,6152015/01/20 2012265  ET WEB_CLIENT Hex Obfuscation of Script Tag %u UTF-16 Encoding; [1,2
9,6142015/01/20 2012264  ET WEB_CLIENT Hex Obfuscation of Script Tag %u UTF-8 Encoding; [1,2
9,6132015/01/20 2012263  ET WEB_CLIENT Hex Obfuscation of Script Tag % Encoding; [1,2
9,6122015/01/20 2012262  ET WEB_CLIENT Hex Obfuscation of parseInt %u UTF-16 Encoding; [1,2,3
< 341  342  343  344  345  346  347  348  349  350 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.