시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
24,6112017/04/29 2024257  ET MALWARE Loadmoney.A Checkin 8; [1
24,6102017/04/29 2024255  ET MALWARE Loadmoney.A Checkin 7; [1
24,6092017/04/29 2024254  ET MALWARE Loadmoney.A Checkin 6; [1
24,6082017/04/29 2024251  ET MALWARE Loadmoney.A Checkin 2; [1
24,6072017/04/29 2024252  ET MALWARE Loadmoney.A Checkin 3; [1
24,6062017/04/29 2024260  ET MALWARE Win32.LoadMoney User Agent; [1
24,6052017/04/29 2024261  ET MALWARE Loadmoney Checkin 3; [1
24,6042017/04/29 2024249  ET MALWARE Loadmoney User Agent; [1
24,6032017/04/29 2024256  ET MALWARE Loadmoney.A Checkin 5; [1
24,6022017/04/29 2024250  ET MALWARE Loadmoney.A Checkin 1; [1
24,6012017/04/29 2024253  ET MALWARE Loadmoney.A Checkin 4; [1
24,6002017/04/29 2024264  ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1
24,5992017/04/27 2024239  ET TROJAN MSIL/Karmen Ransomware CnC Activity;  
24,5982017/04/27 2024245  ET TROJAN Known IoT Malware Domain; [1
24,5972017/04/27 2024246  ET TROJAN Observed Malicious SSL cert (pyteHole Ransomware);  
24,5962017/04/27 2024248  ET TROJAN Possible DANDERSPRITZ HTTP Beacon;  
24,5952017/04/27 2024244  ET TROJAN Known IoT Malware Domain; [1
24,5942017/04/27 2024247  ET TROJAN Possible DANDERSPRITZ Default HTTP Headers;  
24,5932017/04/27 2024241  ET TROJAN ARM Binary Downloaded via WGET Containing Suspicious Netcat Command - Possible IoT Malware; [1
24,5922017/04/27 2024240  ET INFO ARM File Requested via WGET (set);  
24,5912017/04/27 2024243  ET TROJAN ARM Binary Requested via WGET to Known IoT Malware Domain; [1
24,5902017/04/27 2024242  ET TROJAN ARM Binary Downloaded via WGET Containing GoAhead and Multiple Camera RCE 0Day Vulnerabilities; [1,2
24,5892017/04/26 2024237  ET CURRENT_EVENTS ElTest Exploit Kit Redirection Script; [1
24,5882017/04/26 2024238  ET CURRENT_EVENTS HoeflerText Chrome Popup DriveBy Download Attempt; [1
24,5872017/04/26 2024236  ET INFO SMTP PDF Attachment Flowbit Set;  
24,5862017/04/22 2024235  ET INFO DNS Query to Free Hosting Domain (freevnn . com);  
24,5852017/04/22 2024231  ET CURRENT_EVENTS Successful iCloud Phish Apr 20 2017;  
24,5842017/04/22 2024234  ET EXPLOIT BlueCoat CAS v1.3.7.1 Report Email Command Injection attempt; [1,2
24,5832017/04/22 2024232  ET CURRENT_EVENTS Successful Alitalia Airline Phish Apr 20 2017;  
24,5822017/04/22 444444  ET TROJAN Unknown Possibly Ransomware (Dropped by RIG) CnC Beacon;  
24,5812017/04/21 2024230  ET CURRENT_EVENTS iCloud Phishing Landing Sept 2 2016;  
24,5802017/04/21 2024227  ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing; [1,2
24,5792017/04/21 2024228  ET INFO Suspicious HTML Decimal Obfuscated Title - Possible Phishing Landing Apr 19 2017;  
24,5782017/04/21 2024229  ET CURRENT_EVENTS Known Malicious Expires Header Seen In Malicious JavaScript Downloader Campaign;  
24,5772017/04/20 2024226  ET WEB_CLIENT Office Discovery HTA file Likely CVE-2017-0199 Request M2;  
24,5762017/04/20 2024224  ET WEB_CLIENT Office Requesting .HTA File Likely CVE-2017-0199 Request;  
24,5752017/04/20 2024223  ET TROJAN MSIL/Runsome Ransomware CnC Checkin; [1
24,5742017/04/20 2024225  ET WEB_CLIENT Office UA FB SET;  
24,5732017/04/19 2024214  ET EXPLOIT Possible ECLIPSEDWING RPCTOUCH MS08-067;  
24,5722017/04/19 2024215  ET EXPLOIT Possible ECLIPSEDWING MS08-067;  
24,5712017/04/19 2024220  ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Request (set);  
24,5702017/04/19 2024212  ET EXPLOIT Possible ETERNALCHAMPION MS17-010 Sync Request (set);  
24,5692017/04/19 2024218  ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response;  
24,5682017/04/19 2024222  ET EXPLOIT Possible EXPLODINGCAN IIS5.0/6.0 Exploit Attempt;  
24,5672017/04/19 2024217  ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray;  
24,5662017/04/19 2024219  ET EXPLOIT Possible ETERNALROMANCE MS17-010 Heap Spray;  
24,5652017/04/19 2024208  ET EXPLOIT Possible ETERNALROMANCE MS17-010;  
24,5642017/04/19 2024221  ET TROJAN Possible Malicious Gzip PowerShell over HTTP;  
24,5632017/04/19 2024207  ET EXPLOIT Possible Successful ETERNALROMANCE MS17-010 - Windows Executable Observed;  
24,5622017/04/19 2024216  ET EXPLOIT Possible DOUBLEPULSAR Beacon Response;  
< 51  52  53  54  55  56  57  58  59  60 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.