| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 21,011 | 2015/04/29 |  2021018  |  ET EXPLOIT WNR2000v4 HTTP POST RCE Attempt Via Timestamp Discovery; [1]  | 
| 21,010 | 2015/04/29 |  2021015  |  ET TROJAN Win32/Ruckguv.A SSL Cert;   | 
| 21,009 | 2015/04/29 |  2021016  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Ransomware CnC); [1]  | 
| 21,008 | 2015/04/29 |  2021014  |  ET TROJAN CryptoWall SSL Cert;   | 
| 21,007 | 2015/04/29 |  2021013  |  ET TROJAN Likely Dridex Generic SSL Cert;   | 
| 21,006 | 2015/04/29 |  2021012  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 100; [1,2]  | 
| 21,005 | 2015/04/26 |  2021009  |  ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 1;   | 
| 21,004 | 2015/04/26 |  2021011  |  ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 3;   | 
| 21,003 | 2015/04/26 |  2021010  |  ET TROJAN Email Contains wininet.dll Call - Potentially Dridex MalDoc 2;   | 
| 21,002 | 2015/04/26 |  2021008  |  ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 3;   | 
| 21,001 | 2015/04/26 |  2021005  |  ET WEB_SPECIFIC_APPS Vulnerable Magento Adminhtml Access; [1]  | 
| 21,000 | 2015/04/26 |  2021006  |  ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 1;   | 
| 20,999 | 2015/04/26 |  2021007  |  ET TROJAN Email Contains InternetOpen WinInet API Call - Potentially Dridex MalDoc 2;   | 
| 20,998 | 2015/04/26 |  2021004  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M9;   | 
| 20,997 | 2015/04/26 |  2021003  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M8;   | 
| 20,996 | 2015/04/26 |  2021002  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M7;   | 
| 20,995 | 2015/04/26 |  2021001  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M6;   | 
| 20,994 | 2015/04/26 |  2020999  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M4;   | 
| 20,993 | 2015/04/26 |  2021000  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M5;   | 
| 20,992 | 2015/04/26 |  2020998  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M3;   | 
| 20,991 | 2015/04/26 |  2020997  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M2;   | 
| 20,990 | 2015/04/26 |  2020995  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M0;   | 
| 20,989 | 2015/04/26 |  2020996  |  ET CURRENT_EVENTS Fiesta Payload/Exploit URI Struct M1;   | 
| 20,988 | 2015/04/26 |  2020994  |  ET CURRENT_EVENTS Possible Sundown EK Flash Exploit Struct T2 Apr 24 2015;   | 
| 20,987 | 2015/04/26 |  2020991  |  ET CURRENT_EVENTS Possible Sundown EK Payload Struct T2 M1 Apr 24 2015;   | 
| 20,986 | 2015/04/26 |  2020993  |  ET CURRENT_EVENTS IonCube Encoded Page (no alert);   | 
| 20,985 | 2015/04/26 |  2020992  |  ET CURRENT_EVENTS Possible Sundown EK Payload Struct T2 M2 Apr 24 2015;   | 
| 20,984 | 2015/04/26 |  2020989  |  ET CURRENT_EVENTS Possible Sundown EK Payload Struct T1 Apr 24 2015;   | 
| 20,983 | 2015/04/26 |  2020990  |  ET CURRENT_EVENTS Sundown EK Secondary Landing T1 M2 Apr 24 2015;   | 
| 20,982 | 2015/04/26 |  2020988  |  ET CURRENT_EVENTS Possible Sundown EK URI Struct T1 Apr 24 2015;   | 
| 20,981 | 2015/04/26 |  2020985  |  ET CURRENT_EVENTS Sundown EK Secondary Landing Apr 20 2015;   | 
| 20,980 | 2015/04/26 |  2020986  |  ET CURRENT_EVENTS Possible Dridex Downloader SSL Certificate;   | 
| 20,979 | 2015/04/26 |  2020987  |  ET CURRENT_EVENTS Download file with Powershell via LNK file (observed in Sundown EK);   | 
| 20,978 | 2015/04/25 |  2020983  |  ET CURRENT_EVENTS Fiesta EK Java Exploit Apr 23 2015;   | 
| 20,977 | 2015/04/25 |  2020984  |  ET CURRENT_EVENTS Fiesta EK PDF Exploit Apr 23 2015;   | 
| 20,976 | 2015/04/25 |  2020982  |  ET CURRENT_EVENTS Fiesta EK SilverLight Exploit Apr 23 2015;   | 
| 20,975 | 2015/04/25 |  2020981  |  ET CURRENT_EVENTS Fiesta EK Flash Exploit Apr 23 2015;   | 
| 20,974 | 2015/04/25 |  2020979  |  ET CURRENT_EVENTS Fiesta EK Landing Apr 23 2015;   | 
| 20,973 | 2015/04/25 |  2020980  |  ET CURRENT_EVENTS Fiesta EK IE Exploit Apr 23 2015;   | 
| 20,972 | 2015/04/25 |  2020977  |  ET EXPLOIT Possible Redirect to SMB exploit attempt - 303; [1]  | 
| 20,971 | 2015/04/25 |  2020978  |  ET TROJAN DDoS.Win32.Agent.bay Variant Covert Channel (VERSONEX);   | 
| 20,970 | 2015/04/25 |  2020976  |  ET EXPLOIT Possible Redirect to SMB exploit attempt - 307; [1,2]  | 
| 20,969 | 2015/04/24 |  2020969  |  ET TROJAN CozyDuke APT Possible SSL Cert 4; [1]  | 
| 20,968 | 2015/04/24 |  2020973  |  ET POLICY Petite Packed Binary Download;   | 
| 20,967 | 2015/04/24 |  2020970  |  ET TROJAN CozyDuke APT Possible SSL Cert 5; [1]  | 
| 20,966 | 2015/04/24 |  2020971  |  ET TROJAN CozyDuke APT Possible SSL Cert 6; [1]  | 
| 20,965 | 2015/04/24 |  2020972  |  ET TROJAN CozyDuke APT Possible SSL Cert 7; [1]  | 
| 20,964 | 2015/04/24 |  2020975  |  ET CURRENT_EVENTS Nuclear EK Landing Apr 22 2015;   | 
| 20,963 | 2015/04/24 |  2020974  |  ET TROJAN CozyDuke APT Possible SSL Cert 8; [1,2]  | 
| 20,962 | 2015/04/24 |  2020965  |  ET TROJAN CozyDuke APT HTTP CnC Beacon Response; [1]  | 
| < 121  122  123  124  125  126  127  128  129  130 > |