시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
24,5612017/04/19 2024213  ET EXPLOIT Possible ETERNALCHAMPION MS17-010 Sync Response;  
24,5602017/04/19 2024206  ET TROJAN Quant Loader Download Response M2;  
24,5592017/04/18 2024205  ET TROJAN Win32/Cradle Ransomware Onion Domain;  
24,5582017/04/14 2024204  ET TROJAN MSIL/Hidden-Tear Variant Ransomware CnC Checkin;  
24,5572017/04/14 2024203  ET TROJAN Win32/Mole Ransomware CnC Beacon; [1
24,5562017/04/13 2024198  ET CURRENT_EVENTS EITest SocENG Payload DL;  
24,5552017/04/13 2024197  ET CURRENT_EVENTS SUSPICIOUS MSXMLHTTP DL of HTA (Observed in RTF 0-day );  
24,5542017/04/13 2024201  ET MOBILE_MALWARE AdWare.AndroidOS.Ewind.cd Checkin;  
24,5532017/04/13 2024199  ET CURRENT_EVENTS EITest SocENG Inject M2;  
24,5522017/04/13 2024202  ET MOBILE_MALWARE AdWare.AndroidOS.Ewind.cd Response;  
24,5512017/04/13 2024200  ET CURRENT_EVENTS EITest SocENG Inject M3;  
24,5502017/04/11 2024195  ET WEB_CLIENT HTA File Download Flowbit Set;  
24,5492017/04/11 2024196  ET WEB_CLIENT HTA File containing Wscript.Shell Call - Potential Office Exploit Attempt; [1,2
24,5482017/04/11 2024192  ET EXPLOIT Possible RTF 0-day HTA;  
24,5472017/04/11 2024194  ET EXPLOIT Cisco Catalyst Remote Code Execution (CVE-2017-3881); [1
24,5462017/04/11 2024193  ET EXPLOIT Possible RTF 0-day HTA M2;  
24,5452017/04/08 2024186  ET CURRENT_EVENTS Successful Santander Phish M1 Apr 07 2017;  
24,5442017/04/08 2024189  ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1
24,5432017/04/08 2024190  ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1
24,5422017/04/08 2024191  ET EXPLOIT TP-Link Archer C2 and Archer C20i Remote Code Execution; [1
24,5412017/04/08 2024187  ET CURRENT_EVENTS Successful Santander Phish M2 Apr 07 2017;  
24,5402017/04/08 2024188  ET CURRENT_EVENTS Successful Santander Phish M3 Apr 07 2017;  
24,5392017/04/08 2024185  ET CURRENT_EVENTS Successful HM Revenue & Customs Phish M2 Apr 07 2017;  
24,5382017/04/08 2024183  ET TROJAN Possible Turla Carbon Paper CnC Beacon (Fake User-Agent); [1
24,5372017/04/08 2024184  ET CURRENT_EVENTS Successful HM Revenue & Customs Phish M1 Apr 07 2017;  
24,5362017/04/07 2024182  ET TROJAN MSIL/NR42 Bot Parsing Config From Webpage;  
24,5352017/04/06 2024175  ET TROJAN Red Leaves HTTP CnC Beacon (APT10 implant); [1,2
24,5342017/04/06 2523442  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 722; [1
24,5332017/04/06 2024174  ET TROJAN [NCC Group] Red Leaves magic packet response detected (APT10 implant); [1,2
24,5322017/04/06 2523440  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 721; [1
24,5312017/04/06 2523444  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 723; [1
24,5302017/04/06 2523436  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 719; [1
24,5292017/04/06 2523452  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 727; [1
24,5282017/04/06 2523450  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 726; [1
24,5272017/04/06 2024172  ET MOBILE_MALWARE Android Trojan Pegasus CnC Beacon M2; [1
24,5262017/04/06 2024173  ET TROJAN [NCC Group] Red Leaves magic packet detected (APT10 implant); [1,2
24,5252017/04/06 2523446  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 724; [1
24,5242017/04/06 2523448  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 725; [1
24,5232017/04/06 2024180  ET CURRENT_EVENTS Terror EK Payload Download;  
24,5222017/04/06 2024179  ET TROJAN Win32/Neutrino Checkin 6; [1
24,5212017/04/06 2523438  ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 720; [1
24,5202017/04/06 2024177  ET TROJAN Felismus CnC Beacon 2; [1
24,5192017/04/06 2024178  ET TROJAN MSIL/Matrix Ransomware Sending Encrypted Filelist;  
24,5182017/04/06 2024181  ET EXPLOIT D-LINK DIR-615 Cross-Site Request Forgery (CVE-2017-7398);  
24,5172017/04/06 2024176  ET TROJAN Felismus CnC Beacon 1; [1
24,5162017/04/06 2024171  ET MOBILE_MALWARE Android Trojan Pegasus CnC Beacon; [1
24,5152017/04/06 2024169  ET CURRENT_EVENTS Terror EK CVE-2016-0189 Exploit M2;  
24,5142017/04/06 2024170  ET CURRENT_EVENTS Terror EK CVE-2015-2419 Exploit;  
24,5132017/04/06 2024168  ET CURRENT_EVENTS Terror EK CVE-2016-0189 Exploit;  
24,5122017/04/06 2024167  ET CURRENT_EVENTS Successful Mail.ru Phish Apr 04 2017;  
< 51  52  53  54  55  56  57  58  59  60 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.