| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
| 21,011 | 2015/04/29 | 2021018 | ET EXPLOIT WNR2000v4 HTTP POST RCE Attempt Via Timestamp Discovery; [1] |
| 21,010 | 2015/04/29 | 2021015 | ET TROJAN Win32/Ruckguv.A SSL Cert; |
| 21,009 | 2015/04/29 | 2021016 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Ransomware CnC); [1] |
| 21,008 | 2015/04/29 | 2021014 | ET TROJAN CryptoWall SSL Cert; |
| 21,007 | 2015/04/29 | 2021013 | ET TROJAN Likely Dridex Generic SSL Cert; |
| 21,006 | 2015/04/29 | 2021012 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 100; [1,2] |
| 21,005 | 2015/04/26 | 2021009 | ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 1; |
| 21,004 | 2015/04/26 | 2021011 | ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 3; |
| 21,003 | 2015/04/26 | 2021010 | ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 2; |
| 21,002 | 2015/04/26 | 2021008 | ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 3; |
| 21,001 | 2015/04/26 | 2021005 | ET WEB_SPECIFIC_APPS Vulnerable Magento Adminhtml Access; [1] |
| 21,000 | 2015/04/26 | 2021006 | ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 1; |
| 20,999 | 2015/04/26 | 2021007 | ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 2; |
| 20,998 | 2015/04/26 | 2021004 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M9; |
| 20,997 | 2015/04/26 | 2021003 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M8; |
| 20,996 | 2015/04/26 | 2021002 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M7; |
| 20,995 | 2015/04/26 | 2021001 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M6; |
| 20,994 | 2015/04/26 | 2020999 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M4; |
| 20,993 | 2015/04/26 | 2021000 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M5; |
| 20,992 | 2015/04/26 | 2020998 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M3; |
| 20,991 | 2015/04/26 | 2020997 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M2; |
| 20,990 | 2015/04/26 | 2020995 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M0; |
| 20,989 | 2015/04/26 | 2020996 | ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M1; |
| 20,988 | 2015/04/26 | 2020994 | ET CURRENT_EVENTS Possible Sundown EK Flash Exploit Struct T2 Apr 24 2015; |
| 20,987 | 2015/04/26 | 2020991 | ET CURRENT_EVENTS Possible Sundown EK Payload Struct T2 M1 Apr 24 2015; |
| 20,986 | 2015/04/26 | 2020993 | ET CURRENT_EVENTS IonCube Encoded Page (no alert); |
| 20,985 | 2015/04/26 | 2020992 | ET CURRENT_EVENTS Possible Sundown EK Payload Struct T2 M2 Apr 24 2015; |
| 20,984 | 2015/04/26 | 2020989 | ET CURRENT_EVENTS Possible Sundown EK Payload Struct T1 Apr 24 2015; |
| 20,983 | 2015/04/26 | 2020990 | ET CURRENT_EVENTS Sundown EK Secondary Landing T1 M2 Apr 24 2015; |
| 20,982 | 2015/04/26 | 2020988 | ET CURRENT_EVENTS Possible Sundown EK URI Struct T1 Apr 24 2015; |
| 20,981 | 2015/04/26 | 2020985 | ET CURRENT_EVENTS Sundown EK Secondary Landing Apr 20 2015; |
| 20,980 | 2015/04/26 | 2020986 | ET CURRENT_EVENTS Possible Dridex Downloader SSL Certificate; |
| 20,979 | 2015/04/26 | 2020987 | ET CURRENT_EVENTS Download file with Powershell via LNK file (observed in Sundown EK); |
| 20,978 | 2015/04/25 | 2020983 | ET CURRENT_EVENTS Fiesta EK Java Exploit Apr 23 2015; |
| 20,977 | 2015/04/25 | 2020984 | ET CURRENT_EVENTS Fiesta EK PDF Exploit Apr 23 2015; |
| 20,976 | 2015/04/25 | 2020982 | ET CURRENT_EVENTS Fiesta EK SilverLight Exploit Apr 23 2015; |
| 20,975 | 2015/04/25 | 2020981 | ET CURRENT_EVENTS Fiesta EK Flash Exploit Apr 23 2015; |
| 20,974 | 2015/04/25 | 2020979 | ET CURRENT_EVENTS Fiesta EK Landing Apr 23 2015; |
| 20,973 | 2015/04/25 | 2020980 | ET CURRENT_EVENTS Fiesta EK IE Exploit Apr 23 2015; |
| 20,972 | 2015/04/25 | 2020977 | ET EXPLOIT Possible Redirect to SMB exploit attempt - 303; [1] |
| 20,971 | 2015/04/25 | 2020978 | ET TROJAN DDoS.Win32.Agent.bay Variant Covert Channel (VERSONEX); |
| 20,970 | 2015/04/25 | 2020976 | ET EXPLOIT Possible Redirect to SMB exploit attempt - 307; [1,2] |
| 20,969 | 2015/04/24 | 2020969 | ET TROJAN CozyDuke APT Possible SSL Cert 4; [1] |
| 20,968 | 2015/04/24 | 2020973 | ET POLICY Petite Packed Binary Download; |
| 20,967 | 2015/04/24 | 2020970 | ET TROJAN CozyDuke APT Possible SSL Cert 5; [1] |
| 20,966 | 2015/04/24 | 2020971 | ET TROJAN CozyDuke APT Possible SSL Cert 6; [1] |
| 20,965 | 2015/04/24 | 2020972 | ET TROJAN CozyDuke APT Possible SSL Cert 7; [1] |
| 20,964 | 2015/04/24 | 2020975 | ET CURRENT_EVENTS Nuclear EK Landing Apr 22 2015; |
| 20,963 | 2015/04/24 | 2020974 | ET TROJAN CozyDuke APT Possible SSL Cert 8; [1,2] |
| 20,962 | 2015/04/24 | 2020965 | ET TROJAN CozyDuke APT HTTP CnC Beacon Response; [1] |
| < 121 122 123 124 125 126 127 128 129 130 > |