시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
25,3612017/10/26 2024926  ET TROJAN Possible IoT_reaper ELF Binary Request M3 (set); [1
25,3602017/10/26 2024927  ET TROJAN Possible IoT_reaper ELF Binary Request M4 (set); [1
25,3592017/10/26 2024929  ET TROJAN Possible IoT_reaper ELF Binary Download; [1
25,3582017/10/26 2024920  ET EXPLOIT AVTECH Authenticated Command Injection in PwdGrp.cgi; [1
25,3572017/10/26 2024922  ET TROJAN IoT_reaper DNS Lookup M2; [1
25,3562017/10/26 2024912  ET CURRENT_EVENTS Possible BadRabbit Driveby Download M2 Oct 24 2017; [1
25,3552017/10/26 2024913  ET EXPLOIT D-Link 850L Password Extract Attempt; [1
25,3542017/10/26 2024923  ET TROJAN IoT_reaper DNS Lookup M3; [1
25,3532017/10/26 2024914  ET EXPLOIT Netgear ReadyNAS Surveillance Unauthenticated Remote Command Execution; [1
25,3522017/10/26 2024911  ET CURRENT_EVENTS Possible BadRabbit Driveby Download M1 Oct 24 2017; [1
25,3512017/10/25 2024910  ET TROJAN BadRabbit Ransomware Payment Onion Domain;  
25,3502017/10/25 2024904  ET MALWARE [PTsecurity] Adware.FileFinder Activity;  
25,3492017/10/25 2024909  ET CURRENT_EVENTS Qtloader encrypted check-in response Oct 19 (1);  
25,3482017/10/25 2024907  ET CURRENT_EVENTS Qtloader encrypted payload Oct 19 (1);  
25,3472017/10/25 2024908  ET CURRENT_EVENTS Qtloader encrypted check-in Oct 19 (1);  
25,3462017/10/25 2024905  ET TROJAN BadRabbit Ransomware Activity Via WebDAV (cscc);  
25,3452017/10/25 2024906  ET TROJAN BadRabbit Ransomware Activity Via WebDAV (infpub);  
25,3442017/10/24 2405139  ET CNC Shadowserver Reported CnC Server Port 65267 Group 1; [1,2
25,3432017/10/24 2024899  ET TROJAN Possible Dragonfly APT Activity HTTP URI OPTIONS; [1,2
25,3422017/10/24 2024896  ET MOBILE_MALWARE Android JadeRAT CnC Beacon 2; [1
25,3412017/10/24 2024893  ET TROJAN OSX/Proton.C/D Domain (handbrake .cc in TLS SNI); [1,2
25,3402017/10/24 2024902  ET TROJAN Observed Malicious SSL Cert (Snatch CnC);  
25,3392017/10/24 2024895  ET MOBILE_MALWARE Android JadeRAT CnC Beacon; [1
25,3382017/10/24 2024894  ET TROJAN Dragonfly Backdoor.Goodor Go Implant CnC Beacon 1;  
25,3372017/10/24 2024890  ET TROJAN OSX/Proton.C/D Domain (handbrakestore .com in DNS Lookup); [1,2
25,3362017/10/24 2024897  ET USER_AGENTS Go HTTP Client User-Agent;  
25,3352017/10/24 2024900  ET TROJAN Locky Intermediate Downloader;  
25,3342017/10/24 2024901  ET TROJAN Trickbot Payload Request;  
25,3332017/10/24 2024903  ET TROJAN Observed Malicious SSL Cert (Snatch CnC);  
25,3322017/10/24 2024891  ET TROJAN OSX/Proton.C/D Domain (handbrakestore .com in TLS SNI); [1,2
25,3312017/10/24 2024888  ET TROJAN OSX/Proton.C/D Domain (eltima .in in DNS Lookup); [1,2
25,3302017/10/24 2024889  ET TROJAN OSX/Proton.C/D Domain (eltima .in in TLS SNI); [1,2
25,3292017/10/24 2024898  ET TROJAN Possible Dragonfly APT Activity - SMB credential harvesting; [1,2
25,3282017/10/24 2024892  ET TROJAN OSX/Proton.C/D Domain (handbrake .cc in DNS Lookup); [1,2
25,3272017/10/21 2024886  ET EXPLOIT Possible CVE-2017-12629 RCE Exploit Attempt (HTTP GET 1); [1
25,3262017/10/21 2024885  ET EXPLOIT Possible CVE-2017-12629 XXE Exploit Attempt (URI); [1
25,3252017/10/21 2024883  ET CURRENT_EVENTS SUSPICIOUS PSHELL Downloader Primitives B645W Oct 19 2017;  
25,3242017/10/21 2024887  ET EXPLOIT Possible CVE-2017-12629 RCE Exploit Attempt (HTTP GET 2); [1
25,3232017/10/21 2024881  ET CURRENT_EVENTS SUSPICIOUS PSHELL Downloader Primitives B644W Oct 19 2017;  
25,3222017/10/21 2024882  ET CURRENT_EVENTS SUSPICIOUS PSHELL Downloader Primitives B645W Oct 19 2017;  
25,3212017/10/21 2024880  ET CURRENT_EVENTS SUSPICIOUS PSHELL Downloader Primitives B643 Oct 19 2017;  
25,3202017/10/21 2024878  ET CURRENT_EVENTS SUSPICIOUS PSHELL Downloader Primitives B641 Oct 19 2017;  
25,3192017/10/21 2024884  ET EXPLOIT Possible CVE-2017-12629 RCE Exploit Attempt (HTTP POST); [1
25,3182017/10/21 2024879  ET CURRENT_EVENTS SUSPICIOUS PSHELL Downloader Primitives B642 Oct 19 2017;  
25,3172017/10/20 2024871  ET TROJAN Possible Winnti-related DNS Lookup (google-statics .com); [1
25,3162017/10/20 2024860  ET TROJAN Possible Winnti-related DNS Lookup; [1
25,3152017/10/20 2024869  ET TROJAN Possible Winnti-related DNS Lookup; [1
25,3142017/10/20 2024873  ET TROJAN Possible Winnti-related DNS Lookup; [1
25,3132017/10/20 2024866  ET TROJAN Possible Winnti-related Destination; [1
25,3122017/10/20 2024864  ET TROJAN Possible Winnti-related Destination; [1
< 31  32  33  34  35  36  37  38  39  40 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.