시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
25,4112017/11/08 2024969  ET TROJAN OceanLotus System Profiling JavaScript HTTP Request; [1
25,4102017/11/08 2024970  ET CURRENT_EVENTS Possible Paypal Phishing Landing - Title over non SSL;  
25,4092017/11/07 2024968  ET TROJAN Volex ? OceanLotus System Profiling JavaScript (linkStorage.x00SOCKET); [1
25,4082017/11/07 2024955  ET TROJAN [PTsecurity] Win32/Randrew!rfn CnC Activity; [1
25,4072017/11/07 2024954  ET TROJAN SAD Ransomware CnC Activity;  
25,4062017/11/07 2024965  ET TROJAN RouteX CnC Domain (3ec9b600789b3bacf2c72ebae142a9c3 .net in DNS Lookup); [1
25,4052017/11/07 2024966  ET TROJAN Volex ? OceanLotus JavaScript Load (connect.js); [1
25,4042017/11/07 2024967  ET TROJAN Volex ? OceanLotus JavaScript Fake Page URL Builder Response; [1
25,4032017/11/07 2024956  ET TROJAN RouteX CnC Domain (cba4a6e5d3c956548a337c52388473f1 .com in DNS Lookup); [1
25,4022017/11/07 2024961  ET TROJAN RouteX CnC Domain (18bca7c5fd709ac468ba148c590ef6bf .net in DNS Lookup); [1
25,4012017/11/07 2024959  ET TROJAN RouteX CnC Domain (dcb5684707f6c66492aaa9f7d9bfb5a6 .biz in DNS Lookup); [1
25,4002017/11/07 2024958  ET TROJAN RouteX CnC Domain (73780fbd309561e201a4aee9914d882d .org in DNS Lookup); [1
25,3992017/11/07 2024957  ET TROJAN RouteX CnC Domain (0a0074066c49886a39b5a3072582f5d6 .net in DNS Lookup); [1
25,3982017/11/07 2024962  ET TROJAN RouteX CnC Domain (aaafc94b3a37b75ae9cb60afc42e86fe .org in DNS Lookup); [1
25,3972017/11/07 2024960  ET TROJAN RouteX CnC Domain (322ffbbc7c1b312c2f9d942f20422f8d .com in DNS Lookup); [1
25,3962017/11/07 2024963  ET TROJAN RouteX CnC Domain (c13a856f4a879a89e9a638207efd6c94 .biz in DNS Lookup); [1
25,3952017/11/07 2024964  ET TROJAN RouteX CnC Domain (2fa3c2fa16c47d9b9bff8986a42b048f .com in DNS Lookup); [1
25,3942017/11/04 2024953  ET MOBILE_MALWARE Android Marcher Trojan Download - Austrian Bank Targeting;  
25,3932017/11/04 2024952  ET MOBILE_MALWARE Android Marcher Trojan Download - BankAustria Targeting (set);  
25,3922017/11/04 2024947  ET CURRENT_EVENTS Successful Raiffeisen Phish Nov 03 2017;  
25,3912017/11/04 2024951  ET MOBILE_MALWARE Android Marcher Trojan Download - Sparkasse Bank Targeting (set);  
25,3902017/11/04 2024949  ET CURRENT_EVENTS Successful BankAustria Phish Nov 03 2017;  
25,3892017/11/04 2024945  ET CURRENT_EVENTS SOCENG Fake Update/Installer ForceDL Template Nov 03 2017;  
25,3882017/11/04 2024944  ET CURRENT_EVENTS Sparkasse Phishing Domain Nov 03 2017;  
25,3872017/11/04 2024948  ET CURRENT_EVENTS Successful Sparkasse Phish Nov 03 2017;  
25,3862017/11/04 2024946  ET CURRENT_EVENTS BankAustria Phishing Domain Nov 03 2017;  
25,3852017/11/04 2024943  ET CURRENT_EVENTS Raiffeisen Phishing Domain Nov 03 2017;  
25,3842017/11/04 2024950  ET MOBILE_MALWARE Android Marcher Trojan Download - Raiffeisen Bank Targeting (set);  
25,3832017/11/03 2024942  ET CURRENT_EVENTS 401TRG Successful Multi-Email Phish - Observed in Docusign/Dropbox/Onedrive/Gdrive Nov 02 2017;  
25,3822017/11/02 2024941  ET EXPLOIT Possible Oracle Identity Manager Attempt to Logon with default account; [1
25,3812017/11/01 2024934  ET TROJAN IoT_reaper DNS Lookup M5; [1
25,3802017/11/01 2024935  ET TROJAN IoT_reaper DNS Lookup M6; [1
25,3792017/11/01 2024937  ET TROJAN Downeks/Quasar DNS Lookup (cloudns .club); [1
25,3782017/11/01 2024940  ET TROJAN Downeks/Quasar DNS Lookup (moreoffer .life); [1
25,3772017/11/01 2024938  ET TROJAN Downeks/Quasar DNS Lookup (topsite .life); [1
25,3762017/11/01 2024936  ET TROJAN IoT_reaper DNS Lookup M7; [1
25,3752017/11/01 2024939  ET TROJAN Downeks/Quasar DNS Lookup (updatesforme .club); [1
25,3742017/11/01 2024933  ET TROJAN IoT_reaper DNS Lookup M4; [1
25,3732017/10/28 2024932  ET CURRENT_EVENTS Possible BACKSWING JS Framework POST Observed; [1
25,3722017/10/27 2024931  ET ATTACK_RESPONSE 401TRG Perl DDoS IRCBot File Download;  
25,3712017/10/27 2024930  ET WEB_SERVER 401TRG Generic Webshell Request - POST with wget in body;  
25,3702017/10/26 2024921  ET TROJAN IoT_reaper DNS Lookup M1; [1
25,3692017/10/26 2024924  ET TROJAN Possible IoT_reaper ELF Binary Request M1 (set); [1
25,3682017/10/26 2024925  ET TROJAN Possible IoT_reaper ELF Binary Request M2 (set); [1
25,3672017/10/26 2024917  ET EXPLOIT AVTECH Unauthenticated Command Injection in DVR Devices; [1
25,3662017/10/26 2024915  ET EXPLOIT Possible Vacron NVR Remote Command Execution; [1
25,3652017/10/26 2024928  ET TROJAN Possible IoT_reaper ELF Binary Request M5 (set); [1
25,3642017/10/26 2024918  ET EXPLOIT AVTECH Authenticated Command Injection in CloudSetup.cgi; [1
25,3632017/10/26 2024919  ET EXPLOIT AVTECH Authenticated Command Injection in adcommand.cgi; [1
25,3622017/10/26 2024916  ET EXPLOIT Netgear DGN Remote Command Execution; [1
< 31  32  33  34  35  36  37  38  39  40 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.