| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 25,561 | 2017/12/06 |  2025105  |  ET INFO DNS Query for Suspicious .ga Domain;   | 
| 25,560 | 2017/12/06 |  2025115  |  ET CURRENT_EVENTS Possible Successful Generic Phish (set) 2017-12-04;   | 
| 25,559 | 2017/12/06 |  2025113  |  ET CURRENT_EVENTS Possible Credentials Sent to Suspicious TLD via HTTP GET;   | 
| 25,558 | 2017/12/06 |  2025099  |  ET CURRENT_EVENTS Possible Successful Generic Phish (set) 2017-12-03;   | 
| 25,557 | 2017/12/03 |  2025096  |  ET POLICY DNS Query to .onion proxy Domain (onion .casa in DNS Lookup); [1]  | 
| 25,556 | 2017/12/03 |  2025094  |  ET MALWARE Win32/Adware.Adposhel.A Checkin 5;   | 
| 25,555 | 2017/12/03 |  2025095  |  ET POLICY .onion proxy Domain (onion .plus in DNS Lookup); [1]  | 
| 25,554 | 2017/12/03 |  2025093  |  ET TROJAN UBoatRAT CnC Check-in; [1]  | 
| 25,553 | 2017/11/30 |  2025088  |  ET TROJAN Vawtrak/NeverQuest Posting Data;   | 
| 25,552 | 2017/11/30 |  2025086  |  ET WEB_CLIENT Microsoft Excel file download - SET 1;   | 
| 25,551 | 2017/11/30 |  2025091  |  ET WEB_CLIENT Adobe Acrobat PDF Reader use after free JavaScript engine (CVE-2017-16393);   | 
| 25,550 | 2017/11/30 |  2025084  |  ET WEB_CLIENT Microsoft Rich Text File download with vulnerable ActiveX control flowbit set 3;   | 
| 25,549 | 2017/11/30 |  2025087  |  ET TROJAN Vawtrak/NeverQuest Posting Data;   | 
| 25,548 | 2017/11/30 |  2025089  |  ET TROJAN Vawtrak/NeverQuest CnC Beacon;   | 
| 25,547 | 2017/11/30 |  2025083  |  ET WEB_CLIENT Microsoft Rich Text File download with vulnerable ActiveX control flowbit set 2;   | 
| 25,546 | 2017/11/30 |  2025092  |  ET USER_AGENTS Suspicious User-Agent (GeneralDownloadApplication);   | 
| 25,545 | 2017/11/30 |  2025090  |  ET NETBIOS Tree Connect AndX Request IPC$ Unicode;   | 
| 25,544 | 2017/11/30 |  2025082  |  ET WEB_CLIENT Microsoft Rich Text File download with vulnerable ActiveX control flowbit set 1;   | 
| 25,543 | 2017/11/30 |  2025085  |  ET WEB_CLIENT Hostile Microsoft Rich Text File (RTF) with corrupted listoverride;   | 
| 25,542 | 2017/11/29 |  2025073  |  ET TROJAN Patchwork Domain (randreports .org in DNS Lookup); [1]  | 
| 25,541 | 2017/11/29 |  2025081  |  ET TROJAN Patchwork Domain (rannd .org in DNS Lookup); [1]  | 
| 25,540 | 2017/11/29 |  2025078  |  ET TROJAN Mirai Variant Domain (bigboatreps .pw in DNS Lookup); [1]  | 
| 25,539 | 2017/11/29 |  2025080  |  ET EXPLOIT Actiontec C1000A backdoor account M1;   | 
| 25,538 | 2017/11/29 |  2025077  |  ET TROJAN [PTsecurity] Bladabindi/njRAT (Dd19271927);   | 
| 25,537 | 2017/11/29 |  2025075  |  ET TROJAN Brazilian Banker SSL Cert;   | 
| 25,536 | 2017/11/29 |  2025071  |  ET CURRENT_EVENTS Bingo Exploit Kit Landing May 08 2017;   | 
| 25,535 | 2017/11/29 |  2025072  |  ET TROJAN Patchwork DNS Tunneling (nsn1.winodwsupdates .me); [1]  | 
| 25,534 | 2017/11/29 |  2025065  |  ET TROJAN Backdoor.Perl.Shellbot.cd IRC Bot that have DoS/DDoS functions; [1]  | 
| 25,533 | 2017/11/29 |  2025076  |  ET TROJAN Brazilian Banker SSL Cert;   | 
| 25,532 | 2017/11/29 |  2025068  |  ET TROJAN Win32/Ropest.H CnC - INBOUND set;   | 
| 25,531 | 2017/11/29 |  2025079  |  ET TROJAN Mirai Variant Domain (blacklister .nl in DNS Lookup); [1]  | 
| 25,530 | 2017/11/29 |  2025066  |  ET CHAT IRC USER Likely bot with 0 0 colon checkin;   | 
| 25,529 | 2017/11/29 |  2025064  |  ET CURRENT_EVENTS Possible Neutrino EK Landing Landing URI Struct (fb set);   | 
| 25,528 | 2017/11/29 |  2025074  |  ET TROJAN [PTsecurity] Bladabindi/njRAT (HAMAD versions);   | 
| 25,527 | 2017/11/29 |  2025070  |  ET TROJAN Possible Win32/Atraps Receiving Config via Image File (steganography);   | 
| 25,526 | 2017/11/29 |  2025069  |  ET TROJAN Win32/Ropest.H CnC - INBOUND;   | 
| 25,525 | 2017/11/29 |  2025067  |  ET CHAT IRC USER Off-port Likely bot with 0 0 colon checkin;   | 
| 25,524 | 2017/11/28 |  2405156  |  ET CNC Shadowserver Reported CnC Server Port 47221 Group 1; [1,2]  | 
| 25,523 | 2017/11/28 |  2405157  |  ET CNC Shadowserver Reported CnC Server Port 51987 Group 1; [1,2]  | 
| 25,522 | 2017/11/28 |  2405158  |  ET CNC Shadowserver Reported CnC Server Port 54321 Group 1; [1,2]  | 
| 25,521 | 2017/11/28 |  2405159  |  ET CNC Shadowserver Reported CnC Server Port 65267 Group 1; [1,2]  | 
| 25,520 | 2017/11/28 |  2025062  |  ET WEB_CLIENT PowerShell call in script 2;   | 
| 25,519 | 2017/11/28 |  2025060  |  ET WEB_CLIENT Google Chrome Credential Stealing via SCF file Reflected Request; [1]  | 
| 25,518 | 2017/11/28 |  2025058  |  ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing July 07 2016 M7;   | 
| 25,517 | 2017/11/28 |  2025059  |  ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing July 07 2016 M8;   | 
| 25,516 | 2017/11/28 |  2025063  |  ET EXPLOIT Exim4 UAF Attempt (BDAT with non-printable chars); [1]  | 
| 25,515 | 2017/11/28 |  2025061  |  ET WEB_CLIENT PowerShell call in script 1;   | 
| 25,514 | 2017/11/28 |  2025057  |  ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing July 07 2016 M6;   | 
| 25,513 | 2017/11/28 |  2025048  |  ET CURRENT_EVENTS Job314/Neutrino Reboot EK Landing June 11 2016 M4 (with URI Primer);   | 
| 25,512 | 2017/11/28 |  2025049  |  ET CURRENT_EVENTS Job314/Neutrino EK Landing Jul 04 2016 M1;   | 
| < 31  32  33  34  35  36  37  38  39  40 > |