| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 24,611 | 2017/04/29 |  2024257  |  ET MALWARE Loadmoney.A Checkin 8; [1]  | 
| 24,610 | 2017/04/29 |  2024255  |  ET MALWARE Loadmoney.A Checkin 7; [1]  | 
| 24,609 | 2017/04/29 |  2024254  |  ET MALWARE Loadmoney.A Checkin 6; [1]  | 
| 24,608 | 2017/04/29 |  2024251  |  ET MALWARE Loadmoney.A Checkin 2; [1]  | 
| 24,607 | 2017/04/29 |  2024252  |  ET MALWARE Loadmoney.A Checkin 3; [1]  | 
| 24,606 | 2017/04/29 |  2024260  |  ET MALWARE Win32.LoadMoney User Agent; [1]  | 
| 24,605 | 2017/04/29 |  2024261  |  ET MALWARE Loadmoney Checkin 3; [1]  | 
| 24,604 | 2017/04/29 |  2024249  |  ET MALWARE Loadmoney User Agent; [1]  | 
| 24,603 | 2017/04/29 |  2024256  |  ET MALWARE Loadmoney.A Checkin 5; [1]  | 
| 24,602 | 2017/04/29 |  2024250  |  ET MALWARE Loadmoney.A Checkin 1; [1]  | 
| 24,601 | 2017/04/29 |  2024253  |  ET MALWARE Loadmoney.A Checkin 4; [1]  | 
| 24,600 | 2017/04/29 |  2024264  |  ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1]  | 
| 24,599 | 2017/04/27 |  2024239  |  ET TROJAN MSIL/Karmen Ransomware CnC Activity;   | 
| 24,598 | 2017/04/27 |  2024245  |  ET TROJAN Known IoT Malware Domain; [1]  | 
| 24,597 | 2017/04/27 |  2024246  |  ET TROJAN Observed Malicious SSL cert (pyteHole Ransomware);   | 
| 24,596 | 2017/04/27 |  2024244  |  ET TROJAN Known IoT Malware Domain; [1]  | 
| 24,595 | 2017/04/27 |  2024248  |  ET TROJAN Possible DANDERSPRITZ HTTP Beacon;   | 
| 24,594 | 2017/04/27 |  2024247  |  ET TROJAN Possible DANDERSPRITZ Default HTTP Headers;   | 
| 24,593 | 2017/04/27 |  2024241  |  ET TROJAN ARM Binary Downloaded via WGET Containing Suspicious Netcat Command - Possible IoT Malware; [1]  | 
| 24,592 | 2017/04/27 |  2024240  |  ET INFO ARM File Requested via WGET (set);   | 
| 24,591 | 2017/04/27 |  2024243  |  ET TROJAN ARM Binary Requested via WGET to Known IoT Malware Domain; [1]  | 
| 24,590 | 2017/04/27 |  2024242  |  ET TROJAN ARM Binary Downloaded via WGET Containing GoAhead and Multiple Camera RCE 0Day Vulnerabilities; [1,2]  | 
| 24,589 | 2017/04/26 |  2024237  |  ET CURRENT_EVENTS ElTest Exploit Kit Redirection Script; [1]  | 
| 24,588 | 2017/04/26 |  2024238  |  ET CURRENT_EVENTS HoeflerText Chrome Popup DriveBy Download Attempt; [1]  | 
| 24,587 | 2017/04/26 |  2024236  |  ET INFO SMTP PDF Attachment Flowbit Set;   | 
| 24,586 | 2017/04/22 |  2024235  |  ET INFO DNS Query to Free Hosting Domain (freevnn . com);   | 
| 24,585 | 2017/04/22 |  2024231  |  ET CURRENT_EVENTS Successful iCloud Phish Apr 20 2017;   | 
| 24,584 | 2017/04/22 |  2024234  |  ET EXPLOIT BlueCoat CAS v1.3.7.1 Report Email Command Injection attempt; [1,2]  | 
| 24,583 | 2017/04/22 |  2024232  |  ET CURRENT_EVENTS Successful Alitalia Airline Phish Apr 20 2017;   | 
| 24,582 | 2017/04/22 |  444444  |  ET TROJAN Unknown Possibly Ransomware (Dropped by RIG) CnC Beacon;   | 
| 24,581 | 2017/04/21 |  2024230  |  ET CURRENT_EVENTS iCloud Phishing Landing Sept 2 2016;   | 
| 24,580 | 2017/04/21 |  2024227  |  ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing; [1,2]  | 
| 24,579 | 2017/04/21 |  2024228  |  ET INFO Suspicious HTML Decimal Obfuscated Title - Possible Phishing Landing Apr 19 2017;   | 
| 24,578 | 2017/04/21 |  2024229  |  ET CURRENT_EVENTS Known Malicious Expires Header Seen In Malicious JavaScript Downloader Campaign;   | 
| 24,577 | 2017/04/20 |  2024226  |  ET WEB_CLIENT Office Discovery HTA file Likely CVE-2017-0199 Request M2;   | 
| 24,576 | 2017/04/20 |  2024224  |  ET WEB_CLIENT Office Requesting .HTA File Likely CVE-2017-0199 Request;   | 
| 24,575 | 2017/04/20 |  2024223  |  ET TROJAN MSIL/Runsome Ransomware CnC Checkin; [1]  | 
| 24,574 | 2017/04/20 |  2024225  |  ET WEB_CLIENT Office UA FB SET;   | 
| 24,573 | 2017/04/19 |  2024214  |  ET EXPLOIT Possible ECLIPSEDWING RPCTOUCH MS08-067;   | 
| 24,572 | 2017/04/19 |  2024215  |  ET EXPLOIT Possible ECLIPSEDWING MS08-067;   | 
| 24,571 | 2017/04/19 |  2024220  |  ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Request (set);   | 
| 24,570 | 2017/04/19 |  2024212  |  ET EXPLOIT Possible ETERNALCHAMPION MS17-010 Sync Request (set);   | 
| 24,569 | 2017/04/19 |  2024218  |  ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response;   | 
| 24,568 | 2017/04/19 |  2024222  |  ET EXPLOIT Possible EXPLODINGCAN IIS5.0/6.0 Exploit Attempt;   | 
| 24,567 | 2017/04/19 |  2024217  |  ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray;   | 
| 24,566 | 2017/04/19 |  2024219  |  ET EXPLOIT Possible ETERNALROMANCE MS17-010 Heap Spray;   | 
| 24,565 | 2017/04/19 |  2024208  |  ET EXPLOIT Possible ETERNALROMANCE MS17-010;   | 
| 24,564 | 2017/04/19 |  2024207  |  ET EXPLOIT Possible Successful ETERNALROMANCE MS17-010 - Windows Executable Observed;   | 
| 24,563 | 2017/04/19 |  2024221  |  ET TROJAN Possible Malicious Gzip PowerShell over HTTP;   | 
| 24,562 | 2017/04/19 |  2024216  |  ET EXPLOIT Possible DOUBLEPULSAR Beacon Response;   | 
| < 51  52  53  54  55  56  57  58  59  60 > |