| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 20,761 | 2015/03/29 |  2020767  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 66; [1]  | 
| 20,760 | 2015/03/29 |  2020766  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 65; [1]  | 
| 20,759 | 2015/03/29 |  2020764  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 63; [1]  | 
| 20,758 | 2015/03/29 |  2020763  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 62; [1]  | 
| 20,757 | 2015/03/28 |  2020762  |  ET TROJAN Vawtrak/NeverQuest .onion Proxy Domain (llgerw4plyyff446); [1]  | 
| 20,756 | 2015/03/28 |  2020761  |  ET TROJAN Vawtrak/NeverQuest .onion Proxy Domain (bc3ywvif4m3lnw4o); [1]  | 
| 20,755 | 2015/03/28 |  2020760  |  ET TROJAN Vawtrak/NeverQuest .onion Proxy Domain (4bpthx5z4e7n6gnb); [1]  | 
| 20,754 | 2015/03/28 |  2020758  |  ET CURRENT_EVENTS VBA Office Document Dridex Binary Download User-Agent;   | 
| 20,753 | 2015/03/28 |  2020759  |  ET TROJAN Vawtrak/NeverQuest .onion Proxy Domain (otsaa35gxbcwvrqs); [1]  | 
| 20,752 | 2015/03/28 |  2020757  |  ET MALWARE Windows executable sent when remote host claims to send an image 2;   | 
| 20,751 | 2015/03/27 |  2020756  |  ET WEB_CLIENT Firefox Proxy Prototype RCE Attempt (CVE-2014-8636); [1]  | 
| 20,750 | 2015/03/27 |  2020753  |  ET EXPLOIT Metasploit Plugin-Detect Posting Data 6; [1]  | 
| 20,749 | 2015/03/27 |  2020754  |  ET EXPLOIT Metasploit Plugin-Detect Posting Data 7; [1]  | 
| 20,748 | 2015/03/27 |  2020752  |  ET EXPLOIT Metasploit Plugin-Detect Posting Data 5; [1]  | 
| 20,747 | 2015/03/27 |  2020751  |  ET EXPLOIT Metasploit Plugin-Detect Posting Data 4; [1]  | 
| 20,746 | 2015/03/27 |  2020755  |  ET EXPLOIT Metasploit Browser Exploit Server Plugin Detect 2;   | 
| 20,745 | 2015/03/27 |  2020746  |  ET TROJAN Win32.Chroject.B Retrieving encoded payload;   | 
| 20,744 | 2015/03/27 |  2020749  |  ET TROJAN Win32.Chroject.B Receiving ClickFraud Commands from CnC 2;   | 
| 20,743 | 2015/03/27 |  2020747  |  ET TROJAN Win32.Chroject.B Requesting ClickFraud Commands from CnC;   | 
| 20,742 | 2015/03/27 |  2020748  |  ET TROJAN Win32.Chroject.B Receiving ClickFraud Commands from CnC 1;   | 
| 20,741 | 2015/03/27 |  2020750  |  ET TROJAN Win32.Chroject.B ClickFraud Request;   | 
| 20,740 | 2015/03/27 |  2020745  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1]  | 
| 20,739 | 2015/03/26 |  2020742  |  ET TROJAN Win32.Hyteod.acox Domain Generation Algorithm (DGA) Lookup NXDOMAIN Response;   | 
| 20,738 | 2015/03/26 |  2020744  |  ET CURRENT_EVENTS HanJuan EK Landing March 24 2015 M2;   | 
| 20,737 | 2015/03/26 |  2020743  |  ET CURRENT_EVENTS HanJuan EK Landing March 24 2015 M1;   | 
| 20,736 | 2015/03/26 |  2020741  |  ET TROJAN Win32.Hyteod.acox Domain Generation Algorithm (DGA) Lookup NXDOMAIN Response;   | 
| 20,735 | 2015/03/26 |  2020740  |  ET TROJAN CryptoLocker .onion Proxy Domain (iezqmd4s2fflmh7n);   | 
| 20,734 | 2015/03/26 |  2020738  |  ET TROJAN Win32/TrojanProxy.JpiProx.B CnC Beacon 2;   | 
| 20,733 | 2015/03/26 |  2020739  |  ET TROJAN Unknown Trojan DNS Query to .onion proxy Domain (l7gbml27czk3kvr5);   | 
| 20,732 | 2015/03/26 |  2020736  |  ET CURRENT_EVENTS Unauthorized SSL Cert for Google Domains; [1]  | 
| 20,731 | 2015/03/26 |  2020737  |  ET TROJAN Win32/TrojanProxy.JpiProx.B CnC Beacon 1;   | 
| 20,730 | 2015/03/26 |  2020734  |  ET TROJAN Fileless infection dropped by EK CnC Beacon;   | 
| 20,729 | 2015/03/26 |  2020735  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Ransomware CnC); [1]  | 
| 20,728 | 2015/03/25 |  2020733  |  ET WEB_SPECIFIC_APPS Possible Netscaler SQLi bypass (cookie); [1]  | 
| 20,727 | 2015/03/25 |  2020732  |  ET WEB_SPECIFIC_APPS Possible Netscaler SQLi bypass (POST data); [1]  | 
| 20,726 | 2015/03/25 |  2020730  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (22);   | 
| 20,725 | 2015/03/25 |  2020731  |  ET WEB_SPECIFIC_APPS Possible Netscaler SQLi bypass (URI data); [1]  | 
| 20,724 | 2015/03/25 |  2020727  |  ET TROJAN Zbot .onion Proxy Domain (3bjpwsf3fjcwtnwx);   | 
| 20,723 | 2015/03/25 |  2020728  |  ET TROJAN Possible Adwind SSL Cert (assylias.Inc);   | 
| 20,722 | 2015/03/25 |  2020729  |  ET MOBILE_MALWARE Android.Trojan.SMSSend.Y;   | 
| 20,721 | 2015/03/25 |  2020726  |  ET CURRENT_EVENTS RIG EK Landing March 20 2015 M2;   | 
| 20,720 | 2015/03/22 |  2020724  |  ET TROJAN KeyLogger related to FindPOS CnC Beacon; [1,2]  | 
| 20,719 | 2015/03/22 |  2020725  |  ET CURRENT_EVENTS RIG EK Landing March 20 2015;   | 
| 20,718 | 2015/03/22 |  2020723  |  ET TROJAN FindPOS Checkin;   | 
| 20,717 | 2015/03/22 |  2020722  |  ET CURRENT_EVENTS RIG Landing URI Struct March 20 2015;   | 
| 20,716 | 2015/03/22 |  2020719  |  ET CURRENT_EVENTS Possible HanJuan Landing March 20 2015;   | 
| 20,715 | 2015/03/22 |  2020717  |  ET TROJAN Win32/Teslacrypt Ransomware HTTP CnC Beacon M1;   | 
| 20,714 | 2015/03/22 |  2020718  |  ET TROJAN Win32/Teslacrypt Ransomware HTTP CnC Beacon M2;   | 
| 20,713 | 2015/03/22 |  2020720  |  ET CURRENT_EVENTS RIG Payload URI Struct March 20 2015;   | 
| 20,712 | 2015/03/22 |  2020721  |  ET CURRENT_EVENTS RIG Exploit URI Struct March 20 2015;   | 
| < 121  122  123  124  125  126  127  128  129  130 > |