번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
25,561 | 2017/12/06 | 2025105 | ET INFO DNS Query for Suspicious .ga Domain; |
25,560 | 2017/12/06 | 2025115 | ET CURRENT_EVENTS Possible Successful Generic Phish (set) 2017-12-04; |
25,559 | 2017/12/06 | 2025113 | ET CURRENT_EVENTS Possible Credentials Sent to Suspicious TLD via HTTP GET; |
25,558 | 2017/12/06 | 2025099 | ET CURRENT_EVENTS Possible Successful Generic Phish (set) 2017-12-03; |
25,557 | 2017/12/03 | 2025096 | ET POLICY DNS Query to .onion proxy Domain (onion .casa in DNS Lookup); [1] |
25,556 | 2017/12/03 | 2025094 | ET MALWARE Win32/Adware.Adposhel.A Checkin 5; |
25,555 | 2017/12/03 | 2025095 | ET POLICY .onion proxy Domain (onion .plus in DNS Lookup); [1] |
25,554 | 2017/12/03 | 2025093 | ET TROJAN UBoatRAT CnC Check-in; [1] |
25,553 | 2017/11/30 | 2025088 | ET TROJAN Vawtrak/NeverQuest Posting Data; |
25,552 | 2017/11/30 | 2025086 | ET WEB_CLIENT Microsoft Excel file download - SET 1; |
25,551 | 2017/11/30 | 2025091 | ET WEB_CLIENT Adobe Acrobat PDF Reader use after free JavaScript engine (CVE-2017-16393); |
25,550 | 2017/11/30 | 2025084 | ET WEB_CLIENT Microsoft Rich Text File download with vulnerable ActiveX control flowbit set 3; |
25,549 | 2017/11/30 | 2025087 | ET TROJAN Vawtrak/NeverQuest Posting Data; |
25,548 | 2017/11/30 | 2025089 | ET TROJAN Vawtrak/NeverQuest CnC Beacon; |
25,547 | 2017/11/30 | 2025083 | ET WEB_CLIENT Microsoft Rich Text File download with vulnerable ActiveX control flowbit set 2; |
25,546 | 2017/11/30 | 2025092 | ET USER_AGENTS Suspicious User-Agent (GeneralDownloadApplication); |
25,545 | 2017/11/30 | 2025090 | ET NETBIOS Tree Connect AndX Request IPC$ Unicode; |
25,544 | 2017/11/30 | 2025082 | ET WEB_CLIENT Microsoft Rich Text File download with vulnerable ActiveX control flowbit set 1; |
25,543 | 2017/11/30 | 2025085 | ET WEB_CLIENT Hostile Microsoft Rich Text File (RTF) with corrupted listoverride; |
25,542 | 2017/11/29 | 2025073 | ET TROJAN Patchwork Domain (randreports .org in DNS Lookup); [1] |
25,541 | 2017/11/29 | 2025081 | ET TROJAN Patchwork Domain (rannd .org in DNS Lookup); [1] |
25,540 | 2017/11/29 | 2025078 | ET TROJAN Mirai Variant Domain (bigboatreps .pw in DNS Lookup); [1] |
25,539 | 2017/11/29 | 2025077 | ET TROJAN [PTsecurity] Bladabindi/njRAT (Dd19271927); |
25,538 | 2017/11/29 | 2025080 | ET EXPLOIT Actiontec C1000A backdoor account M1; |
25,537 | 2017/11/29 | 2025075 | ET TROJAN Brazilian Banker SSL Cert; |
25,536 | 2017/11/29 | 2025071 | ET CURRENT_EVENTS Bingo Exploit Kit Landing May 08 2017; |
25,535 | 2017/11/29 | 2025072 | ET TROJAN Patchwork DNS Tunneling (nsn1.winodwsupdates .me); [1] |
25,534 | 2017/11/29 | 2025065 | ET TROJAN Backdoor.Perl.Shellbot.cd IRC Bot that have DoS/DDoS functions; [1] |
25,533 | 2017/11/29 | 2025076 | ET TROJAN Brazilian Banker SSL Cert; |
25,532 | 2017/11/29 | 2025068 | ET TROJAN Win32/Ropest.H CnC - INBOUND set; |
25,531 | 2017/11/29 | 2025079 | ET TROJAN Mirai Variant Domain (blacklister .nl in DNS Lookup); [1] |
25,530 | 2017/11/29 | 2025066 | ET CHAT IRC USER Likely bot with 0 0 colon checkin; |
25,529 | 2017/11/29 | 2025064 | ET CURRENT_EVENTS Possible Neutrino EK Landing Landing URI Struct (fb set); |
25,528 | 2017/11/29 | 2025074 | ET TROJAN [PTsecurity] Bladabindi/njRAT (HAMAD versions); |
25,527 | 2017/11/29 | 2025070 | ET TROJAN Possible Win32/Atraps Receiving Config via Image File (steganography); |
25,526 | 2017/11/29 | 2025069 | ET TROJAN Win32/Ropest.H CnC - INBOUND; |
25,525 | 2017/11/29 | 2025067 | ET CHAT IRC USER Off-port Likely bot with 0 0 colon checkin; |
25,524 | 2017/11/28 | 2405156 | ET CNC Shadowserver Reported CnC Server Port 47221 Group 1; [1,2] |
25,523 | 2017/11/28 | 2405157 | ET CNC Shadowserver Reported CnC Server Port 51987 Group 1; [1,2] |
25,522 | 2017/11/28 | 2405158 | ET CNC Shadowserver Reported CnC Server Port 54321 Group 1; [1,2] |
25,521 | 2017/11/28 | 2405159 | ET CNC Shadowserver Reported CnC Server Port 65267 Group 1; [1,2] |
25,520 | 2017/11/28 | 2025062 | ET WEB_CLIENT PowerShell call in script 2; |
25,519 | 2017/11/28 | 2025060 | ET WEB_CLIENT Google Chrome Credential Stealing via SCF file Reflected Request; [1] |
25,518 | 2017/11/28 | 2025063 | ET EXPLOIT Exim4 UAF Attempt (BDAT with non-printable chars); [1] |
25,517 | 2017/11/28 | 2025058 | ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing July 07 2016 M7; |
25,516 | 2017/11/28 | 2025059 | ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing July 07 2016 M8; |
25,515 | 2017/11/28 | 2025061 | ET WEB_CLIENT PowerShell call in script 1; |
25,514 | 2017/11/28 | 2025057 | ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing July 07 2016 M6; |
25,513 | 2017/11/28 | 2025048 | ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing June 11 2016 M4 (with URI Primer); |
25,512 | 2017/11/28 | 2025049 | ET CURRENT_EVENTS Job314/Neutrino EK Landing Jul 04 2016 M1; |
< 31 32 33 34 35 36 37 38 39 40 > |