| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 21,011 | 2015/04/29 | 2021018 | ET EXPLOIT WNR2000v4 HTTP POST RCE Attempt Via Timestamp Discovery; [1] | 
| 21,010 | 2015/04/29 | 2021015 | ET TROJAN Win32/Ruckguv.A SSL Cert; | 
| 21,009 | 2015/04/29 | 2021016 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Ransomware CnC); [1] | 
| 21,008 | 2015/04/29 | 2021014 | ET TROJAN CryptoWall SSL Cert; | 
| 21,007 | 2015/04/29 | 2021013 | ET TROJAN Likely Dridex Generic SSL Cert; | 
| 21,006 | 2015/04/29 | 2021012 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 100; [1,2] | 
| 21,005 | 2015/04/26 | 2021009 | ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 1; | 
| 21,004 | 2015/04/26 | 2021011 | ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 3; | 
| 21,003 | 2015/04/26 | 2021010 | ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 2; | 
| 21,002 | 2015/04/26 | 2021008 | ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 3; | 
| 21,001 | 2015/04/26 | 2021005 | ET WEB_SPECIFIC_APPS Vulnerable Magento Adminhtml Access; [1] | 
| 21,000 | 2015/04/26 | 2021006 | ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 1; | 
| 20,999 | 2015/04/26 | 2021007 | ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 2; | 
| 20,998 | 2015/04/26 | 2021004 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M9; | 
| 20,997 | 2015/04/26 | 2021003 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M8; | 
| 20,996 | 2015/04/26 | 2021002 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M7; | 
| 20,995 | 2015/04/26 | 2021001 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M6; | 
| 20,994 | 2015/04/26 | 2020999 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M4; | 
| 20,993 | 2015/04/26 | 2021000 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M5; | 
| 20,992 | 2015/04/26 | 2020998 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M3; | 
| 20,991 | 2015/04/26 | 2020997 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M2; | 
| 20,990 | 2015/04/26 | 2020995 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M0; | 
| 20,989 | 2015/04/26 | 2020996 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M1; | 
| 20,988 | 2015/04/26 | 2020994 | ET CURRENT_EVENTS Possible Sundown EK Flash Exploit Struct T2 Apr 24 2015; | 
| 20,987 | 2015/04/26 | 2020991 | ET CURRENT_EVENTS Possible Sundown EK Payload Struct T2 M1 Apr 24 2015; | 
| 20,986 | 2015/04/26 | 2020993 | ET CURRENT_EVENTS IonCube Encoded Page (no alert); | 
| 20,985 | 2015/04/26 | 2020992 | ET CURRENT_EVENTS Possible Sundown EK Payload Struct T2 M2 Apr 24 2015; | 
| 20,984 | 2015/04/26 | 2020989 | ET CURRENT_EVENTS Possible Sundown EK Payload Struct T1 Apr 24 2015; | 
| 20,983 | 2015/04/26 | 2020990 | ET CURRENT_EVENTS Sundown EK Secondary Landing T1 M2 Apr 24 2015; | 
| 20,982 | 2015/04/26 | 2020988 | ET CURRENT_EVENTS Possible Sundown EK URI Struct T1 Apr 24 2015; | 
| 20,981 | 2015/04/26 | 2020985 | ET CURRENT_EVENTS Sundown EK Secondary Landing Apr 20 2015; | 
| 20,980 | 2015/04/26 | 2020986 | ET CURRENT_EVENTS Possible Dridex Downloader SSL Certificate; | 
| 20,979 | 2015/04/26 | 2020987 | ET CURRENT_EVENTS Download file with Powershell via LNK file (observed in Sundown EK); | 
| 20,978 | 2015/04/25 | 2020983 | ET CURRENT_EVENTS Fiesta EK Java Exploit Apr 23 2015; | 
| 20,977 | 2015/04/25 | 2020984 | ET CURRENT_EVENTS Fiesta EK PDF Exploit Apr 23 2015; | 
| 20,976 | 2015/04/25 | 2020982 | ET CURRENT_EVENTS Fiesta EK SilverLight Exploit Apr 23 2015; | 
| 20,975 | 2015/04/25 | 2020981 | ET CURRENT_EVENTS Fiesta EK Flash Exploit Apr 23 2015; | 
| 20,974 | 2015/04/25 | 2020979 | ET CURRENT_EVENTS Fiesta EK Landing Apr 23 2015; | 
| 20,973 | 2015/04/25 | 2020980 | ET CURRENT_EVENTS Fiesta EK IE Exploit Apr 23 2015; | 
| 20,972 | 2015/04/25 | 2020977 | ET EXPLOIT Possible Redirect to SMB exploit attempt - 303; [1] | 
| 20,971 | 2015/04/25 | 2020978 | ET TROJAN DDoS.Win32.Agent.bay Variant Covert Channel (VERSONEX); | 
| 20,970 | 2015/04/25 | 2020976 | ET EXPLOIT Possible Redirect to SMB exploit attempt - 307; [1,2] | 
| 20,969 | 2015/04/24 | 2020969 | ET TROJAN CozyDuke APT Possible SSL Cert 4; [1] | 
| 20,968 | 2015/04/24 | 2020973 | ET POLICY Petite Packed Binary Download; | 
| 20,967 | 2015/04/24 | 2020970 | ET TROJAN CozyDuke APT Possible SSL Cert 5; [1] | 
| 20,966 | 2015/04/24 | 2020971 | ET TROJAN CozyDuke APT Possible SSL Cert 6; [1] | 
| 20,965 | 2015/04/24 | 2020972 | ET TROJAN CozyDuke APT Possible SSL Cert 7; [1] | 
| 20,964 | 2015/04/24 | 2020975 | ET CURRENT_EVENTS Nuclear EK Landing Apr 22 2015; | 
| 20,963 | 2015/04/24 | 2020974 | ET TROJAN CozyDuke APT Possible SSL Cert 8; [1,2] | 
| 20,962 | 2015/04/24 | 2020965 | ET TROJAN CozyDuke APT HTTP CnC Beacon Response; [1] | 
| < 121  122  123  124  125  126  127  128  129  130 > |