| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
| 21,211 | 2015/06/10 | 2021216 | ET INFO Executable Downloaded from Google Cloud Storage; |
| 21,210 | 2015/06/10 | 2021210 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,209 | 2015/06/10 | 2021212 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,208 | 2015/06/10 | 2021208 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,207 | 2015/06/10 | 2021211 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,206 | 2015/06/10 | 2021209 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,205 | 2015/06/10 | 2021214 | ET TROJAN Win32/Zacom.A CnC Beacon 2; |
| 21,204 | 2015/06/10 | 2021213 | ET TROJAN Win32/Zacom.A CnC Beacon 1; |
| 21,203 | 2015/06/10 | 2021201 | ET TROJAN Sakula/Mivast RAT CnC Beacon 3; |
| 21,202 | 2015/06/10 | 2021206 | ET CURRENT_EVENTS Fake AV Phone Scam Landing June 8 2015 M1; |
| 21,201 | 2015/06/10 | 2021207 | ET CURRENT_EVENTS Fake AV Phone Scam Landing June 8 2015 M2; |
| 21,200 | 2015/06/10 | 2021199 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,199 | 2015/06/10 | 2021198 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,198 | 2015/06/10 | 2021204 | ET TROJAN DNS Query to TOX Ransomware onion (toxicola7qwv37qj); [1] |
| 21,197 | 2015/06/10 | 2021203 | ET TROJAN Sakula/Mivast RAT CnC Beacon 5; |
| 21,196 | 2015/06/10 | 2021197 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,195 | 2015/06/10 | 2021200 | ET TROJAN Sakula/Mivast RAT CnC Beacon 2; |
| 21,194 | 2015/06/10 | 2021205 | ET POLICY Xpopup Instant Messenger Downloading Configuration; |
| 21,193 | 2015/06/09 | 2021195 | ET POLICY Possible External IP Lookup whoer.net; |
| 21,192 | 2015/06/09 | 2021194 | ET TROJAN Qadars WebInject SSL Cert; |
| 21,191 | 2015/06/09 | 2021192 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Geodo MITM); [1] |
| 21,190 | 2015/06/09 | 2021196 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Spy.Shiz CnC); [1] |
| 21,189 | 2015/06/09 | 2021193 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Gootkit CnC); [1] |
| 21,188 | 2015/06/07 | 2021191 | ET POLICY DNS Query to .onion proxy Domain (statepaytor.com); |
| 21,187 | 2015/06/07 | 2021188 | ET TROJAN KeyBase Keylogger Checkin; [1] |
| 21,186 | 2015/06/07 | 2021189 | ET TROJAN Databack CnC; |
| 21,185 | 2015/06/07 | 2021190 | ET POLICY DNS Query to .onion proxy Domain (clusterpaytor.com); |
| 21,184 | 2015/06/06 | 2021186 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex CnC); [1] |
| 21,183 | 2015/06/06 | 2021187 | ET TROJAN IOS.Oneclickfraud HTTP Host; [1] |
| 21,182 | 2015/06/06 | 2021185 | ET MOBILE_MALWARE Trojan-Banker.AndroidOS.Wroba.m Checkin; [1] |
| 21,181 | 2015/06/06 | 2021179 | ET TROJAN Possible BlackEnergy Accessing SMB/SMB2 Named Pipe (ASCII); [1] |
| 21,180 | 2015/06/06 | 2021181 | ET CURRENT_EVENTS Fake AV Phone Scam Landing June 4 2015 M1; |
| 21,179 | 2015/06/06 | 2021183 | ET CURRENT_EVENTS Fake AV Phone Scam Landing June 4 2015 M3; |
| 21,178 | 2015/06/06 | 2021182 | ET CURRENT_EVENTS Fake AV Phone Scam Landing June 4 2015 M2; |
| 21,177 | 2015/06/06 | 2021184 | ET TROJAN APT Backspace CnC Beacon; |
| 21,176 | 2015/06/06 | 2021180 | ET TROJAN Possible BlackEnergy Accessing SMB/SMB2 Named Pipe (Unicode); [1] |
| 21,175 | 2015/06/04 | 2021178 | ET ATTACK_RESPONSE Metasploit Meterpreter Reverse HTTPS certificate; [1] |
| 21,174 | 2015/06/04 | 2021177 | ET CURRENT_EVENTS Fake AV Phone Scam Landing June 2 2015; |
| 21,173 | 2015/06/04 | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll); |
| 21,172 | 2015/06/03 | 2021174 | ET MOBILE_MALWARE Android Unknown Ransomware Checkin; [1] |
| 21,171 | 2015/06/03 | 2021175 | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Downloader CnC); [1] |
| 21,170 | 2015/05/30 | 2404049 | ET CNC Shadowserver Reported CnC Server IP group 50; [1,2] |
| 21,169 | 2015/05/30 | 2021169 | ET CURRENT_EVENTS suspicious VBE-encoded script (seen in Sundown EK); |
| 21,168 | 2015/05/30 | 2021170 | ET DOS Possible Sentinal LM Application attack in progress Outbound (Response); |
| 21,167 | 2015/05/30 | 2021172 | ET DOS Possible Sentinal LM Amplification attack (Request) Inbound; |
| 21,166 | 2015/05/30 | 2021173 | ET MALWARE PUP Win32/Conduit.SearchProtect.O CnC Beacon; |
| 21,165 | 2015/05/30 | 2021168 | ET TROJAN PunkeyPOS HTTP CnC Beacon 9; [1] |
| 21,164 | 2015/05/30 | 2021163 | ET TROJAN DNS Query to TOX Ransomware onion (wdthvb6jut2rupu4); [1] |
| 21,163 | 2015/05/30 | 2021165 | ET TROJAN DNS Query to TOX Ransomware onion (7fa6gldxg64t5wnt); [1] |
| 21,162 | 2015/05/30 | 2021161 | ET POLICY External IP Lookup - whoer.net; |
| < 111 112 113 114 115 116 117 118 119 120 > |