| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
| 24,561 | 2017/04/19 | 2024213 | ET EXPLOIT Possible ETERNALCHAMPION MS17-010 Sync Response; |
| 24,560 | 2017/04/19 | 2024206 | ET TROJAN Quant Loader Download Response M2; |
| 24,559 | 2017/04/18 | 2024205 | ET TROJAN Win32/Cradle Ransomware Onion Domain; |
| 24,558 | 2017/04/14 | 2024204 | ET TROJAN MSIL/Hidden-Tear Variant Ransomware CnC Checkin; |
| 24,557 | 2017/04/14 | 2024203 | ET TROJAN Win32/Mole Ransomware CnC Beacon; [1] |
| 24,556 | 2017/04/13 | 2024198 | ET CURRENT_EVENTS EITest SocENG Payload DL; |
| 24,555 | 2017/04/13 | 2024201 | ET MOBILE_MALWARE AdWare.AndroidOS.Ewind.cd Checkin; |
| 24,554 | 2017/04/13 | 2024197 | ET CURRENT_EVENTS SUSPICIOUS MSXMLHTTP DL of HTA (Observed in RTF 0-day ); |
| 24,553 | 2017/04/13 | 2024199 | ET CURRENT_EVENTS EITest SocENG Inject M2; |
| 24,552 | 2017/04/13 | 2024202 | ET MOBILE_MALWARE AdWare.AndroidOS.Ewind.cd Response; |
| 24,551 | 2017/04/13 | 2024200 | ET CURRENT_EVENTS EITest SocENG Inject M3; |
| 24,550 | 2017/04/11 | 2024195 | ET WEB_CLIENT HTA File Download Flowbit Set; |
| 24,549 | 2017/04/11 | 2024196 | ET WEB_CLIENT HTA File containing Wscript.Shell Call - Potential Office Exploit Attempt; [1,2] |
| 24,548 | 2017/04/11 | 2024192 | ET EXPLOIT Possible RTF 0-day HTA; |
| 24,547 | 2017/04/11 | 2024194 | ET EXPLOIT Cisco Catalyst Remote Code Execution (CVE-2017-3881); [1] |
| 24,546 | 2017/04/11 | 2024193 | ET EXPLOIT Possible RTF 0-day HTA M2; |
| 24,545 | 2017/04/08 | 2024186 | ET CURRENT_EVENTS Successful Santander Phish M1 Apr 07 2017; |
| 24,544 | 2017/04/08 | 2024189 | ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1] |
| 24,543 | 2017/04/08 | 2024190 | ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1] |
| 24,542 | 2017/04/08 | 2024191 | ET EXPLOIT TP-Link Archer C2 and Archer C20i Remote Code Execution; [1] |
| 24,541 | 2017/04/08 | 2024187 | ET CURRENT_EVENTS Successful Santander Phish M2 Apr 07 2017; |
| 24,540 | 2017/04/08 | 2024188 | ET CURRENT_EVENTS Successful Santander Phish M3 Apr 07 2017; |
| 24,539 | 2017/04/08 | 2024185 | ET CURRENT_EVENTS Successful HM Revenue & Customs Phish M2 Apr 07 2017; |
| 24,538 | 2017/04/08 | 2024183 | ET TROJAN Possible Turla Carbon Paper CnC Beacon (Fake User-Agent); [1] |
| 24,537 | 2017/04/08 | 2024184 | ET CURRENT_EVENTS Successful HM Revenue & Customs Phish M1 Apr 07 2017; |
| 24,536 | 2017/04/07 | 2024182 | ET TROJAN MSIL/NR42 Bot Parsing Config From Webpage; |
| 24,535 | 2017/04/06 | 2024175 | ET TROJAN Red Leaves HTTP CnC Beacon (APT10 implant); [1,2] |
| 24,534 | 2017/04/06 | 2523442 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 722; [1] |
| 24,533 | 2017/04/06 | 2024174 | ET TROJAN [NCC Group] Red Leaves magic packet response detected (APT10 implant); [1,2] |
| 24,532 | 2017/04/06 | 2523440 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 721; [1] |
| 24,531 | 2017/04/06 | 2523444 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 723; [1] |
| 24,530 | 2017/04/06 | 2523436 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 719; [1] |
| 24,529 | 2017/04/06 | 2523452 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 727; [1] |
| 24,528 | 2017/04/06 | 2523450 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 726; [1] |
| 24,527 | 2017/04/06 | 2024172 | ET MOBILE_MALWARE Android Trojan Pegasus CnC Beacon M2; [1] |
| 24,526 | 2017/04/06 | 2024173 | ET TROJAN [NCC Group] Red Leaves magic packet detected (APT10 implant); [1,2] |
| 24,525 | 2017/04/06 | 2523446 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 724; [1] |
| 24,524 | 2017/04/06 | 2523448 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 725; [1] |
| 24,523 | 2017/04/06 | 2024180 | ET CURRENT_EVENTS Terror EK Payload Download; |
| 24,522 | 2017/04/06 | 2024179 | ET TROJAN Win32/Neutrino Checkin 6; [1] |
| 24,521 | 2017/04/06 | 2523438 | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 720; [1] |
| 24,520 | 2017/04/06 | 2024177 | ET TROJAN Felismus CnC Beacon 2; [1] |
| 24,519 | 2017/04/06 | 2024178 | ET TROJAN MSIL/Matrix Ransomware Sending Encrypted Filelist; |
| 24,518 | 2017/04/06 | 2024181 | ET EXPLOIT D-LINK DIR-615 Cross-Site Request Forgery (CVE-2017-7398); |
| 24,517 | 2017/04/06 | 2024176 | ET TROJAN Felismus CnC Beacon 1; [1] |
| 24,516 | 2017/04/06 | 2024171 | ET MOBILE_MALWARE Android Trojan Pegasus CnC Beacon; [1] |
| 24,515 | 2017/04/06 | 2024169 | ET CURRENT_EVENTS Terror EK CVE-2016-0189 Exploit M2; |
| 24,514 | 2017/04/06 | 2024170 | ET CURRENT_EVENTS Terror EK CVE-2015-2419 Exploit; |
| 24,513 | 2017/04/06 | 2024168 | ET CURRENT_EVENTS Terror EK CVE-2016-0189 Exploit; |
| 24,512 | 2017/04/06 | 2024167 | ET CURRENT_EVENTS Successful Mail.ru Phish Apr 04 2017; |
| < 51 52 53 54 55 56 57 58 59 60 > |