| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 22,611 | 2016/03/09 |  2022598  |  ET TROJAN OSX/KeRanger Ransomware CnC DNS Request 1; [1]  | 
| 22,610 | 2016/03/07 |  2022596  |  ET WEB_SERVER Possible Custom Content Type Manager WP Backdoor Access;   | 
| 22,609 | 2016/03/06 |  2022594  |  ET TROJAN Dridex Base64 Filename;   | 
| 22,608 | 2016/03/06 |  2022595  |  ET TROJAN Dridex Base64 Executable;   | 
| 22,607 | 2016/03/05 |  2022591  |  ET CURRENT_EVENTS Fake AV Phone Scam Domain M1 Mar 3;   | 
| 22,606 | 2016/03/05 |  2022592  |  ET CURRENT_EVENTS Fake AV Phone Scam Domain M2 Mar 3;   | 
| 22,605 | 2016/03/05 |  2022593  |  ET CURRENT_EVENTS Fake AV Phone Scam Domain M3 Mar 3;   | 
| 22,604 | 2016/03/04 |  2022590  |  ET TROJAN Ransomware Locky .onion Payment Domain;   | 
| 22,603 | 2016/03/04 |  2022585  |  ET POLICY Possible SSLv2 Negotiation in Progress Client Master Key SSL2_RC2_128_CBC_WITH_MD5; [1]  | 
| 22,602 | 2016/03/04 |  2022586  |  ET POLICY Possible SSLv2 Negotiation in Progress Client Master Key SSL2_RC2_128_CBC_EXPORT40_WITH_MD5; [1]  | 
| 22,601 | 2016/03/04 |  2022588  |  ET POLICY Possible SSLv2 Negotiation in Progress Client Master Key SSL2_DES_64_CBC_WITH_MD5; [1]  | 
| 22,600 | 2016/03/04 |  2022589  |  ET TROJAN Ransomware Locky .onion Payment Domain;   | 
| 22,599 | 2016/03/04 |  2022582  |  ET TROJAN jFect HTTP CnC Checkin;   | 
| 22,598 | 2016/03/04 |  2022583  |  ET POLICY Possible SSLv2 Negotiation in Progress Server Hello; [1]  | 
| 22,597 | 2016/03/04 |  2022587  |  ET POLICY Possible SSLv2 Negotiation in Progress ClientMaster Key SSL2_IDEA_128_CBC_WITH_MD5; [1]  | 
| 22,596 | 2016/03/04 |  2022584  |  ET POLICY Possible SSLv2 Negotiation in Progress Client Master Key SSL2_RC4_128_WITH_MD5; [1]  | 
| 22,595 | 2016/03/02 |  2022581  |  ET CURRENT_EVENTS MySQL Malicious Scanning 3; [1]  | 
| 22,594 | 2016/03/02 |  2022580  |  ET CURRENT_EVENTS MySQL Malicious Scanning 2; [1]  | 
| 22,593 | 2016/03/02 |  2022579  |  ET CURRENT_EVENTS MySQL Malicious Scanning 1; [1]  | 
| 22,592 | 2016/03/02 |  2022574  |  ET CURRENT_EVENTS Possible Fake AV Phone Scam Landing Feb 26;   | 
| 22,591 | 2016/03/02 |  2022573  |  ET TROJAN Andromeda Download;   | 
| 22,590 | 2016/03/02 |  2022576  |  ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain M2 Feb 29;   | 
| 22,589 | 2016/03/02 |  2022575  |  ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain M1 Feb 29;   | 
| 22,588 | 2016/03/02 |  2022572  |  ET TROJAN Andromeda Download (set);   | 
| 22,587 | 2016/03/02 |  2022577  |  ET CURRENT_EVENTS Possible Fake AV Phone Scam Long Domain M3 Feb 29;   | 
| 22,586 | 2016/02/28 |  2022571  |  ET TROJAN Malicious SSL certificate detected (Geodo MITM); [1]  | 
| 22,585 | 2016/02/28 |  2022570  |  ET CURRENT_EVENTS Possible Spam/Phish Campaign Feb 25 2016;   | 
| 22,584 | 2016/02/27 |  2022567  |  ET CURRENT_EVENTS Evil Redirect Leading to EK Feb 25 2016;   | 
| 22,583 | 2016/02/27 |  2022568  |  ET TROJAN Likely PadCrypt Locker PKG DL;   | 
| 22,582 | 2016/02/27 |  2022569  |  ET TROJAN PadCrypt .onion Payment Domain;   | 
| 22,581 | 2016/02/27 |  2022566  |  ET CURRENT_EVENTS Possible Malicious Macro EXE DL AlphaNumL;   | 
| 22,580 | 2016/02/26 |  2022564  |  ET TROJAN Operation Blockbuster User-Agent (Mozillar); [1,2]  | 
| 22,579 | 2016/02/26 |  2022565  |  ET CURRENT_EVENTS Evil Redirect Leading to EK Feb 23 2016;   | 
| 22,578 | 2016/02/25 |  2022562  |  ET MOBILE_MALWARE Backdoor.AndroidOS.Torec.a .onion Proxy Domain;   | 
| 22,577 | 2016/02/25 |  2022563  |  ET MOBILE_MALWARE Backdoor.AndroidOS.Torec.a .onion Proxy Domain 2;   | 
| 22,576 | 2016/02/25 |  2022561  |  ET TROJAN TeslaCrypt/AlphaCrypt Variant .onion Payment Domain(xlowfznrg4wf7dli);   | 
| 22,575 | 2016/02/24 |  2022558  |  ET TROJAN Linux/Tsunami DNS Request (linuxmint.kernel-org.org); [1]  | 
| 22,574 | 2016/02/24 |  2022559  |  ET TROJAN FrameworkPOS Covert DNS CnC Initial Check In; [1]  | 
| 22,573 | 2016/02/24 |  2022560  |  ET TROJAN Ransomware Locky .onion Payment Domain; [1]  | 
| 22,572 | 2016/02/24 |  2022557  |  ET TROJAN Linux/Tsunami DNS Request (eggstrawdinarry.mylittlerepo.com); [1]  | 
| 22,571 | 2016/02/24 |  2022551  |  ET POLICY Logmein.com/Join.me SSL Remote Control Access;   | 
| 22,570 | 2016/02/24 |  2022555  |  ET TROJAN Linux/Tsunami DNS Request (updates.absentvodka.com); [1]  | 
| 22,569 | 2016/02/24 |  2022556  |  ET TROJAN Linux/Tsunami DNS Request (updates.mintylinux.com); [1]  | 
| 22,568 | 2016/02/24 |  2022554  |  ET EXPLOIT FireEye Detection Evasion %temp% attempt - Inbound; [1]  | 
| 22,567 | 2016/02/24 |  2022553  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Malware CnC); [1]  | 
| 22,566 | 2016/02/20 |  2022550  |  ET CURRENT_EVENTS Possible Malicious Macro DL EXE Feb 2016;   | 
| 22,565 | 2016/02/20 |  2022549  |  ET CURRENT_EVENTS Dridex DL Pattern Feb 18 2016;   | 
| 22,564 | 2016/02/20 |  2022548  |  ET TROJAN Ransomware Locky .onion Payment Domain;   | 
| 22,563 | 2016/02/20 |  2022547  |  ET EXPLOIT Possible CVE-2015-7547 Large Response to A/AAAA query;   | 
| 22,562 | 2016/02/20 |  2022541  |  ET TROJAN Possible OceanLotus C2 Checkin; [1]  | 
| < 91  92  93  94  95  96  97  98  99  100 > |