| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 20,911 | 2015/04/17 |  2020914  |  ET POLICY Exe32Pack Packed Executable Download;   | 
| 20,910 | 2015/04/17 |  2020916  |  ET EXPLOIT Possible Redirect to SMB exploit attempt - 302; [1]  | 
| 20,909 | 2015/04/17 |  2020917  |  ET EXPLOIT Possible Redirect to SMB exploit attempt - 301; [1]  | 
| 20,908 | 2015/04/17 |  2020913  |  ET TROJAN W32/Farfli.BHQ!tr Dropper CnC Beacon 2;   | 
| 20,907 | 2015/04/17 |  2020915  |  ET TROJAN CryptoLocker .onion Proxy Domain (33p5mqkaj22irv4z); [1]  | 
| 20,906 | 2015/04/17 |  2020912  |  ET WEB_SERVER Possible IIS Integer Overflow DoS (CVE-2015-1635);   | 
| 20,905 | 2015/04/16 |  2020910  |  ET TROJAN Win32/Ruckguv.A Requesting Payload; [1]  | 
| 20,904 | 2015/04/16 |  2020911  |  ET CURRENT_EVENTS Likely Dridex Multi-part Macro Download M1;   | 
| 20,903 | 2015/04/16 |  2020909  |  ET TROJAN CoinVault CnC Beacon Response; [1]  | 
| 20,902 | 2015/04/16 |  2020908  |  ET TROJAN CoinVault CnC Beacon M2; [1]  | 
| 20,901 | 2015/04/16 |  2020907  |  ET TROJAN CoinVault CnC Beacon M1; [1]  | 
| 20,900 | 2015/04/16 |  2020906  |  ET TROJAN CoinVault Mailer CnC Beacon; [1]  | 
| 20,899 | 2015/04/15 |  2020901  |  ET TROJAN Possible APT30 Fake Mozilla UA; [1]  | 
| 20,898 | 2015/04/15 |  2020905  |  ET CURRENT_EVENTS SPL2 EK Post-Compromise Data Dump M3;   | 
| 20,897 | 2015/04/15 |  2020903  |  ET CURRENT_EVENTS SPL2 EK Post-Compromise Data Dump M1;   | 
| 20,896 | 2015/04/15 |  2020900  |  ET TROJAN Emotet v2 Exfiltrating Outlook information; [1]  | 
| 20,895 | 2015/04/15 |  2020902  |  ET TROJAN LankerBoy HTTP CnC Beacon;   | 
| 20,894 | 2015/04/15 |  2020904  |  ET CURRENT_EVENTS SPL2 EK Post-Compromise Data Dump M2;   | 
| 20,893 | 2015/04/15 |  2020899  |  ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution; [1]  | 
| 20,892 | 2015/04/15 |  2020898  |  ET TROJAN Possible APT30 or Win32/Nuclear HTTP Framework POST; [1]  | 
| 20,891 | 2015/04/15 |  2020897  |  ET TROJAN Possible APT30 or Win32/Nuclear HTTP Framework; [1]  | 
| 20,890 | 2015/04/15 |  2020896  |  ET CURRENT_EVENTS DRIVEBY Router DNS Changer Apr 07 2015 M2;   | 
| 20,889 | 2015/04/12 |  2020894  |  ET CURRENT_EVENTS DRIVEBY EXE Embeded in Page Likely Evil M2;   | 
| 20,888 | 2015/04/12 |  2020895  |  ET CURRENT_EVENTS Magnitude Flash Exploit (IE) M2;   | 
| 20,887 | 2015/04/12 |  2020892  |  ET TROJAN Possible Maldoc Retrieving Dridex from pastebin;   | 
| 20,886 | 2015/04/12 |  2020893  |  ET CURRENT_EVENTS DRIVEBY EXE Embeded in Page Likely Evil M1;   | 
| 20,885 | 2015/04/12 |  2020891  |  ET TROJAN Operation Buhtrap CnC Beacon 2; [1]  | 
| 20,884 | 2015/04/12 |  2020890  |  ET TROJAN Operation Buhtrap CnC Beacon 1; [1]  | 
| 20,883 | 2015/04/12 |  2020888  |  ET INFO invalid.cab domain in SNI;   | 
| 20,882 | 2015/04/12 |  2020889  |  ET TROJAN Vobus/Beebone Sinkhole DNS Reply; [1]  | 
| 20,881 | 2015/04/11 |  2020887  |  ET TROJAN Shellshock Worm Checkin; [1]  | 
| 20,880 | 2015/04/11 |  2020886  |  ET TROJAN Kriptovor External IP Lookup checkip.dyndns.org; [1]  | 
| 20,879 | 2015/04/11 |  2020883  |  ET TROJAN Kriptovor Checkin; [1]  | 
| 20,878 | 2015/04/11 |  2020884  |  ET TROJAN Kriptovor SMTP Traffic; [1]  | 
| 20,877 | 2015/04/11 |  2020885  |  ET TROJAN Kriptovor Retrieving RAR Payload; [1]  | 
| 20,876 | 2015/04/10 |  2020882  |  ET TROJAN Win32/Teslacrypt Ransomware .onion domain (epmhyca5ol6plmx3); [1]  | 
| 20,875 | 2015/04/10 |  2020881  |  ET MALWARE PUP Win32/AdWare.Sendori User-Agent; [1]  | 
| 20,874 | 2015/04/10 |  2020879  |  ET EXPLOIT Linksys WRT54GL DNS Change GET Request; [1]  | 
| 20,873 | 2015/04/10 |  2020880  |  ET EXPLOIT TP-LINK TL-WR750N DNS Change GET Request; [1]  | 
| 20,872 | 2015/04/10 |  2020877  |  ET EXPLOIT Known Malicious Router DNS Change GET Request; [1]  | 
| 20,871 | 2015/04/10 |  2020878  |  ET EXPLOIT TP-LINK TL-WR841N Router DNS Change GET Request; [1]  | 
| 20,870 | 2015/04/10 |  2020874  |  ET EXPLOIT Netgear DGN1000B Router DNS Change GET Request; [1]  | 
| 20,869 | 2015/04/10 |  2020876  |  ET EXPLOIT Tenda ADSL2/2  Router DNS Change GET Request; [1]  | 
| 20,868 | 2015/04/10 |  2020875  |  ET EXPLOIT Belkin G F5D7230-4 Router DNS Change GET Request; [1]  | 
| 20,867 | 2015/04/10 |  2020869  |  ET POLICY DNS Query to .onion proxy Domain (wh47f2as19.com);   | 
| 20,866 | 2015/04/10 |  2020871  |  ET EXPLOIT ASUS RT N56U Router DNS Change GET Request 3; [1]  | 
| 20,865 | 2015/04/10 |  2020873  |  ET EXPLOIT D-link DI604 Known Malicious Router DNS Change GET Request; [1]  | 
| 20,864 | 2015/04/10 |  2020872  |  ET EXPLOIT TP-LINK Known Malicious Router DNS Change GET Request; [1]  | 
| 20,863 | 2015/04/10 |  2020868  |  ET EXPLOIT FritzBox RCE GET Request; [1]  | 
| 20,862 | 2015/04/10 |  2020864  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1]  | 
| < 121  122  123  124  125  126  127  128  129  130 > |