| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 23,161 | 2016/07/07 |  2403430  |  ET CINS Active Threat Intelligence Poor Reputation IP group 131; [1,2]  | 
| 23,160 | 2016/07/07 |  2403435  |  ET CINS Active Threat Intelligence Poor Reputation IP group 136; [1,2]  | 
| 23,159 | 2016/07/07 |  2022951  |  ET TROJAN OSX/Keydnap DNS Query to CnC; [1]  | 
| 23,158 | 2016/07/07 |  2022949  |  ET CURRENT_EVENTS RIG EK Payload Jul 05 2016;   | 
| 23,157 | 2016/07/07 |  2022952  |  ET TROJAN Ransomware Locky CnC Beacon 21 May;   | 
| 23,156 | 2016/07/07 |  2403429  |  ET CINS Active Threat Intelligence Poor Reputation IP group 130; [1,2]  | 
| 23,155 | 2016/07/07 |  2022950  |  ET TROJAN OSX/Keydnap DNS Query to CnC; [1]  | 
| 23,154 | 2016/07/07 |  2022948  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Malware C2); [1]  | 
| 23,153 | 2016/07/07 |  2022945  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Rockloader); [1]  | 
| 23,152 | 2016/07/07 |  2022947  |  ET TROJAN BartCrypt Payment DNS Query to .onion proxy Domain (khh5cmzh5q7yp7th);   | 
| 23,151 | 2016/07/07 |  2022946  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Zeus C2); [1]  | 
| 23,150 | 2016/07/07 |  2022943  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gootkit C2); [1]  | 
| 23,149 | 2016/07/07 |  2022944  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Malware C2); [1]  | 
| 23,148 | 2016/07/03 |  2022942  |  ET CURRENT_EVENTS Possible Malicous Macro DL EXE Jul 01 2016 (exe generic custom headers);   | 
| 23,147 | 2016/07/03 |  2022941  |  ET CURRENT_EVENTS Possible Malicous Macro DL EXE Jul 01 2016 (dll generic custom headers);   | 
| 23,146 | 2016/07/03 |  2022940  |  ET CURRENT_EVENTS Possible Malicous Macro DL EXE Jul 01 2016 (userdir dotted quad);   | 
| 23,145 | 2016/07/03 |  2022939  |  ET CURRENT_EVENTS Possible Malicous Macro DL EXE Jul 01 2016 (pm);   | 
| 23,144 | 2016/07/03 |  2020577  |  ET POLICY DNS Query to .onion proxy Domain (onion.direct); [1]  | 
| 23,143 | 2016/07/03 |  2020574  |  ET POLICY DNS Query to .onion proxy Domain (onion.glass); [1]  | 
| 23,142 | 2016/07/03 |  2020211  |  ET POLICY DNS Query to .onion proxy Domain (onion.gq); [1]  | 
| 23,141 | 2016/07/02 |  2022936  |  ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M4; [1]  | 
| 23,140 | 2016/07/02 |  2022937  |  ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M3; [1]  | 
| 23,139 | 2016/07/02 |  2022938  |  ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toserver M4; [1]  | 
| 23,138 | 2016/07/02 |  2022935  |  ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toserver M3; [1]  | 
| 23,137 | 2016/07/02 |  2022932  |  ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M2; [1]  | 
| 23,136 | 2016/07/02 |  2022933  |  ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M1; [1]  | 
| 23,135 | 2016/07/02 |  2022930  |  ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow; [1]  | 
| 23,134 | 2016/07/02 |  2022929  |  ET TROJAN Win32/Satana Ransomware Checkin; [1]  | 
| 23,133 | 2016/07/01 |  2022928  |  ET CURRENT_EVENTS Tech Support Phone Scam Landing Jun 29 M4;   | 
| 23,132 | 2016/07/01 |  2022927  |  ET CURRENT_EVENTS Tech Support Phone Scam Landing Jun 29 M3;   | 
| 23,131 | 2016/07/01 |  2022926  |  ET CURRENT_EVENTS Tech Support Phone Scam Landing Jun 29 M2;   | 
| 23,130 | 2016/07/01 |  2022925  |  ET CURRENT_EVENTS Tech Support Phone Scam Landing Jun 29 M1;   | 
| 23,129 | 2016/07/01 |  2022923  |  ET EXPLOIT Possible CVE-2016-2209 Symantec PowerPoint Parsing Buffer Overflow M1; [1]  | 
| 23,128 | 2016/07/01 |  2022924  |  ET EXPLOIT Possible CVE-2016-2209 Symantec PowerPoint Parsing Buffer Overflow M2; [1]  | 
| 23,127 | 2016/06/28 |  2403425  |  ET CINS Active Threat Intelligence Poor Reputation IP group 126; [1,2]  | 
| 23,126 | 2016/06/28 |  2403427  |  ET CINS Active Threat Intelligence Poor Reputation IP group 128; [1,2]  | 
| 23,125 | 2016/06/28 |  2403428  |  ET CINS Active Threat Intelligence Poor Reputation IP group 129; [1,2]  | 
| 23,124 | 2016/06/28 |  2403426  |  ET CINS Active Threat Intelligence Poor Reputation IP group 127; [1,2]  | 
| 23,123 | 2016/06/28 |  2022921  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Malware C2); [1]  | 
| 23,122 | 2016/06/28 |  2022922  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (H1N1 C2); [1]  | 
| 23,121 | 2016/06/28 |  2022919  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Malware C2); [1]  | 
| 23,120 | 2016/06/28 |  2022920  |  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gootkit C2); [1]  | 
| 23,119 | 2016/06/28 |  2022917  |  ET TROJAN Ransomware Locky .onion Payment Domain (mphtadhci5mrdlju);   | 
| 23,118 | 2016/06/28 |  2022918  |  ET INFO DYNAMIC_DNS Query to *.duckdns. Domain;   | 
| 23,117 | 2016/06/27 |  2403421  |  ET CINS Active Threat Intelligence Poor Reputation IP group 122; [1,2]  | 
| 23,116 | 2016/06/27 |  2403422  |  ET CINS Active Threat Intelligence Poor Reputation IP group 123; [1,2]  | 
| 23,115 | 2016/06/27 |  2403423  |  ET CINS Active Threat Intelligence Poor Reputation IP group 124; [1,2]  | 
| 23,114 | 2016/06/27 |  2403424  |  ET CINS Active Threat Intelligence Poor Reputation IP group 125; [1,2]  | 
| 23,113 | 2016/06/27 |  2022916  |  ET CURRENT_EVENTS RIG EK Payload Jun 26 2016;   | 
| 23,112 | 2016/06/25 |  2403420  |  ET CINS Active Threat Intelligence Poor Reputation IP group 121; [1,2]  | 
| < 71  72  73  74  75  76  77  78  79  80 > |