Summary:
0 new OPEN, 0 new PRO (0 + 0)
Modified inactive rules:
- 2014146 - ET MALWARE Win32/Spy.Banker Reporting Via SMTP (malware.rules)
- 2014167 - ET MALWARE W32/Mentory CnC Server Providing File Info Details (malware.rules)
- 2014199 - ET EXPLOIT_KIT Exploit Kit Exploiting IEPeers (exploit_kit.rules)
- 2014216 - ET MALWARE Delf/Troxen/Zema controller responding to client (malware.rules)
- 2014217 - ET MALWARE Delf/Troxen/Zema controller delivering clickfraud instructions (malware.rules)
- 2014348 - ET MALWARE RevProxy ClientHello (malware.rules)
- 2014379 - ET POLICY HTTP GET invalid method case outbound (policy.rules)
- 2014572 - ET MALWARE DNS Query for a known malware domain (regicsgf.net) (malware.rules)
- 2014632 - ET MALWARE FireEye.STX RAT Checkin (malware.rules)
- 2014668 - ET MALWARE W32/SpyBanker Infection Confirmation Email (malware.rules)
- 2014700 - ET MALWARE W32/Backdoor.BAT.Agent.W User Botnet (malware.rules)
- 2014720 - ET MALWARE W32/Downloader/Agent.dxh.1 Reporting to CnC (malware.rules)
- 2014827 - ET CURRENT_EVENTS FedEX Spam Inbound (current_events.rules)
- 2014828 - ET CURRENT_EVENTS UPS Spam Inbound (current_events.rules)
- 2014829 - ET CURRENT_EVENTS Post Express Spam Inbound (current_events.rules)
- 2014893 - ET SCAN critical.io Scan (scan.rules)
- 2014996 - ET DOS Microsoft Windows 7 ICMPv6 Router Advertisement Flood (dos.rules)
- 2015016 - ET INFO FTP STOR to External Network (info.rules)
- 2015502 - ET MALWARE ProxyBox -ProxyBotCommand - CHECK_ME (malware.rules)
- 2015511 - ET MALWARE ProxyBox - ProxyBotCommand - FORCE_AUTHENTICATION* (malware.rules)
- 2015513 - ET EXPLOIT Potential RoaringBeast ProFTPd Exploit Specific config files upload (exploit.rules)
- 2015514 - ET EXPLOIT Potential RoaringBeast ProFTPd Exploit nsswitch.conf Upload (exploit.rules)
- 2015515 - ET EXPLOIT Potential RoaringBeast ProFTPd Exploit Specific (CHMOD 777) (exploit.rules)
- 2015521 - ET MALWARE Pakes2 - Server Hello (malware.rules)
- 2015531 - ET MALWARE DNS Query to RunForestRun DGA Domain 16-alpha.waw.pl (malware.rules)
- 2015597 - ET RETIRED DNS Query Gauss Domain *.gowin7.com (retired.rules)
- 2015598 - ET RETIRED DNS Query Gauss Domain *.secuurity.net (retired.rules)
- 2015601 - ET RETIRED DNS Query Gauss Domain *.dataspotlight.net (retired.rules)
- 2015618 - ET RETIRED DNS Query Gauss Domain *.datajunction.org (retired.rules)
- 2015967 - ET P2P QVOD P2P Sharing Traffic detected (udp) payload (p2p.rules)
- 2016017 - ET DOS DNS Amplification Attack Outbound (dos.rules)
- 2018008 - ET MALWARE DNS Query Possible Zbot Infection Query for networksecurityx.hopto.org (malware.rules)
- 2018029 - ET MALWARE ehow/livestrong Malicious Flash 10/11 (malware.rules)
- 2018041 - ET CURRENT_EVENTS Current Asprox Spam Campaign (current_events.rules)
- 2018058 - ET MALWARE Possible KAPTOXA SMB Naming Format (malware.rules)
- 2018094 - ET MALWARE DirtJumper Activity (malware.rules)
- 2018127 - ET EXPLOIT_KIT Goon EK Java JNLP URI Struct Feb 12 2014 (exploit_kit.rules)
- 2018135 - ET CURRENT_EVENTS Current Asprox Spam Campaign 2 (current_events.rules)
- 2018177 - ET EXPLOIT_KIT OnClick Anti-BOT TDS POST Feb 25 2014 (exploit_kit.rules)
- 2018206 - ET EXPLOIT_KIT Hello/LightsOut EK Secondary Landing (exploit_kit.rules)
- 2018207 - ET EXPLOIT_KIT LightsOut EK Exploit/Payload Request (exploit_kit.rules)
- 2018209 - ET EXPLOIT_KIT Rawin EK Java fakav.jar (exploit_kit.rules)
- 2018225 - ET EXPLOIT_KIT Possible Fiesta Jar with four-letter class names (exploit_kit.rules)
- 2018226 - ET EXPLOIT_KIT Possible Neutrino/Fiesta EK SilverLight Exploit March 05 2014 DLL Naming Convention (exploit_kit.rules)
- 2018227 - ET WEB_CLIENT Rawin Flash Landing URI Struct March 05 2014 (web_client.rules)
- 2018228 - ET MALWARE Possible PlugX Common Header Struct (malware.rules)
- 2018237 - ET CURRENT_EVENTS CritX/SafePack/FlashPack SilverLight file as eot (current_events.rules)
- 2018238 - ET CURRENT_EVENTS Possible Safe/CritX/FlashPack Common Filename javadb.php (current_events.rules)
- 2018239 - ET CURRENT_EVENTS Possible Safe/CritX/FlashPack Common Filename javaim.php (current_events.rules)
- 2018240 - ET CURRENT_EVENTS Possible Safe/CritX/FlashPack Common Filename javarh.php (current_events.rules)
- 2018242 - ET MALWARE Possible Zeus GameOver Connectivity Check (malware.rules)
- 2018247 - ET MALWARE Snake rootkit usermode-centric client request (malware.rules)
- 2018279 - ET USER_AGENTS MtGox Leak wallet stealer UA (user_agents.rules)
- 2018283 - ET MALWARE Possible Netwire RAT Client HeartBeat C2 (malware.rules)
- 2018291 - ET MALWARE MultiThreat/Winspy.RAT Keep-Alive (flowbit set) (malware.rules)
- 2018292 - ET MALWARE MultiThreat/Winspy.RAT Keep-Alive Server Response (malware.rules)
- 2018300 - ET MALWARE Win32/Stoberox.B (malware.rules)
- 2018319 - ET MALWARE Upatre SSL Compromised site trudeausociety (malware.rules)
- 2018321 - ET MALWARE Saker UA (malware.rules)
- 2018339 - ET ADWARE_PUP W32/DownloadAdmin.Adware Executable Download Request (adware_pup.rules)
- 2018348 - ET CURRENT_EVENTS Possible Deep Panda WateringHole Related URI Struct (current_events.rules)
- 2018352 - ET MALWARE Possible FakeAV binary download (setup) (malware.rules)
- 2018353 - ET CURRENT_EVENTS Win32.RBrute Scan (Outgoing) (current_events.rules)
- 2018354 - ET CURRENT_EVENTS Win32.RBrute Scan (incoming) (current_events.rules)
- 2018356 - ET CURRENT_EVENTS Win32.RBrute http response (current_events.rules)
- 2018357 - ET EXPLOIT_KIT EvilTDS Redirection (exploit_kit.rules)
- 2018385 - ET MALWARE Zeus.Downloader Campaign Second Stage Executable Request 10/4/2014 (malware.rules)
- 2018394 - ET MALWARE Common Upatre Header Structure (malware.rules)
- 2018441 - ET EXPLOIT_KIT Goon/Infinity URI Struct EK Landing May 05 2014 (exploit_kit.rules)
- 2018442 - ET EXPLOIT_KIT 32-byte by 32-byte PHP EK Gate with HTTP POST (exploit_kit.rules)
- 2018452 - ET MALWARE CryptoWall Check-in (malware.rules)
- 2018454 - ET WEB_CLIENT Possible Malvertising Redirect URI Struct (web_client.rules)
- 2018463 - ET MALWARE possible OneLouder header structure (malware.rules)
- 2018466 - ET MALWARE Possible Backdoor.Unrecom Download (malware.rules)
- 2018478 - ET MALWARE Downloader.Win32.Tesch.A Bot Command Checkin 1 (malware.rules)
- 2018493 - ET WEB_CLIENT Sweet Orange WxH redirection (web_client.rules)
- 2018535 - ET EXPLOIT_KIT CottonCastle EK Landing June 05 2014 (exploit_kit.rules)
- 2018536 - ET EXPLOIT_KIT CottonCastle EK Landing EK Struct (exploit_kit.rules)
- 2018548 - ET MALWARE EtumBot Command Status Message (malware.rules)
- 2018549 - ET MALWARE EtumBot PUT File Response (malware.rules)
- 2018550 - ET MALWARE EtumBot GET File Initial Response (malware.rules)
- 2018551 - ET MALWARE EtumBot GET File Data Upload (malware.rules)
- 2018562 - ET EXPLOIT_KIT BleedingLife Exploit Kit Landing Page Requested (exploit_kit.rules)
- 2018563 - ET EXPLOIT_KIT BleedingLife Exploit Kit SWF Exploit Request (exploit_kit.rules)
- 2018564 - ET EXPLOIT_KIT BleedingLife Exploit Kit JAR Exploit Request (exploit_kit.rules)
- 2018583 - ET EXPLOIT_KIT Sweet Orange EK Common Java Exploit (exploit_kit.rules)
- 2018591 - ET WEB_CLIENT Trojan-Banker.JS.Banker fraudulent redirect boleto payment code (web_client.rules)
- 2018593 - ET EXPLOIT_KIT Safe/CritX/FlashPack EK CVE-2013-3918 (exploit_kit.rules)
- 2018613 - ET EXPLOIT_KIT Evil EK Redirector Cookie June 27 2014 (exploit_kit.rules)
- 2018620 - ET MALWARE Downloader.Win32.Tesch.A Bot Command Checkin 2 (malware.rules)
- 2018626 - ET MALWARE Downloader.Win32.Tesch.A Server Command (bot is ready to start receiving commands) (malware.rules)
- 2018635 - ET MALWARE Common Upatre Header Structure 2 (malware.rules)
- 2018641 - ET MALWARE BANKER.WIN32.BANBRA.BEEC Checkin (malware.rules)
- 2018686 - ET WEB_CLIENT Possible Malvertising Redirect URI Struct Jul 16 2014 (web_client.rules)
- 2018741 - ET EXPLOIT_KIT Fiesta EK randomized javascript Gate Jul 18 2014 (exploit_kit.rules)
- 2018766 - ET MALWARE DNS Query to Pseudo Random Domain for Web Malware (.mynumber.org) (malware.rules)
- 2018783 - ET CURRENT_EVENTS Likely Evil XMLDOM Detection of Local File (current_events.rules)
- 2018785 - ET CURRENT_EVENTS Possible ShellCode Passed as Argument to FlashVars (current_events.rules)
- 2018786 - ET EXPLOIT_KIT Sweet Orange EK CDN Landing Page (exploit_kit.rules)
- 2018793 - ET MALWARE EUPUDS.A Requests for Boleto replacement (malware.rules)
- 2018794 - ET EXPLOIT_KIT Safe/CritX/FlashPack EK Secondary Landing June 28 2014 (exploit_kit.rules)
- 2018795 - ET EXPLOIT_KIT Safe/CritX/FlashPack EK Plugin Detect IE Exploit (exploit_kit.rules)
- 2018796 - ET EXPLOIT_KIT Safe/CritX/FlashPack EK Plugin Detect Java Exploit (exploit_kit.rules)
- 2018797 - ET EXPLOIT_KIT Safe/CritX/FlashPack EK Plugin Detect Flash Exploit (exploit_kit.rules)
- 2018855 - ET MALWARE Possible ClickFraud Trojan Socks5 Connection (malware.rules)
- 2018878 - ET POLICY tor4u tor2web .onion Proxy domain in SNI (policy.rules)
- 2018879 - ET POLICY onion.cab tor2web .onion Proxy domain in SNI (policy.rules)
- 2018892 - ET MALWARE Zbot .onion Proxy domain in SNI Aug 04 2014 (malware.rules)
- 2018909 - ET EXPLOIT_KIT Malvertising Redirection to Exploit Kit Aug 07 2014 (exploit_kit.rules)
- 2018922 - ET EXPLOIT_KIT Turla/SPL EK Java Applet (exploit_kit.rules)
- 2018923 - ET EXPLOIT_KIT Turla/SPL EK Java Exploit (exploit_kit.rules)
- 2018924 - ET EXPLOIT_KIT Turla/SPL EK Java Exploit (exploit_kit.rules)
- 2018963 - ET MALWARE ZeroLocker EXE Download (malware.rules)
- 2018965 - ET EXPLOIT_KIT Malvertising Leading to EK Aug 19 2014 M3 (exploit_kit.rules)
- 2018966 - ET EXPLOIT_KIT Malvertising Leading to EK Aug 19 2014 M1 (exploit_kit.rules)
- 2018967 - ET EXPLOIT_KIT Malvertising Leading to EK Aug 19 2014 M2 (exploit_kit.rules)
- 2018979 - ET MALWARE Miras C2 Activity (malware.rules)
- 2018987 - ET EXPLOIT_KIT Sweet Orange EK Thread Specific Java Exploit (exploit_kit.rules)
- 2018988 - ET EXPLOIT_KIT Unknown Malvertising EK Landing Aug 22 2014 (exploit_kit.rules)
- 2018989 - ET EXPLOIT_KIT Unknown Malvertising EK Landing URI Sruct Aug 22 2014 (exploit_kit.rules)
- 2018992 - ET EXPLOIT_KIT Unknown Malvertising EK Flash URI Sruct Aug 22 2014 (exploit_kit.rules)
- 2018995 - ET EXPLOIT_KIT Archie EK CVE-2014-0515 Aug 24 2014 (exploit_kit.rules)
- 2018996 - ET EXPLOIT_KIT Archie EK CVE-2014-0497 Aug 24 2014 (exploit_kit.rules)
- 2018997 - ET EXPLOIT_KIT Archie EK Secondary Landing Aug 24 2014 (exploit_kit.rules)
- 2018998 - ET EXPLOIT_KIT Archie EK Landing Aug 24 2014 (exploit_kit.rules)
- 2019004 - ET EXPLOIT_KIT FlashPack EK Exploit Flash Post Aug 25 2014 (exploit_kit.rules)
- 2019006 - ET EXPLOIT_KIT FlashPack EK Exploit Landing Aug 25 2014 (exploit_kit.rules)
- 2019007 - ET EXPLOIT_KIT FlashPack EK JS Include Aug 25 2014 (exploit_kit.rules)
- 2019008 - ET CURRENT_EVENTS Safe/CritX/FlashPack Java Payload (current_events.rules)
- 2019023 - ET EXPLOIT_KIT BleedingLife EK Variant Aug 26 2014 (exploit_kit.rules)
- 2019024 - ET CURRENT_EVENTS Offensive Security EMET Bypass Observed in BleedingLife Variant Aug 26 2014 (current_events.rules)
- 2019071 - ET EXPLOIT_KIT NullHole EK Landing Aug 27 2014 (exploit_kit.rules)
- 2019072 - ET EXPLOIT_KIT RIG EK Landing URI Struct (exploit_kit.rules)
- 2019093 - ET CURRENT_EVENTS ScanBox Framework used in WateringHole Attacks (current_events.rules)
- 2019096 - ET CURRENT_EVENTS ScanBox Framework used in WateringHole Attacks KeepAlive (current_events.rules)
- 2019097 - ET EXPLOIT_KIT Archie EK SilverLight URI Struct (exploit_kit.rules)
- 2019098 - ET EXPLOIT_KIT Archie EK Sending Plugin-Detect Data (exploit_kit.rules)
- 2019100 - ET EXPLOIT_KIT FlashPack EK Redirect Sept 01 2014 (exploit_kit.rules)
- 2019130 - ET EXPLOIT_KIT Astrum EK Landing (exploit_kit.rules)
- 2019131 - ET EXPLOIT_KIT Astrum EK Landing (exploit_kit.rules)
- 2019134 - ET WEB_CLIENT Flashpack Redirect Method 2 (web_client.rules)
- 2019146 - ET EXPLOIT_KIT Sweet Orange CDN Gate Sept 09 2014 Method 2 (exploit_kit.rules)
- 2019154 - ET EXPLOIT_KIT Sweet Orange EK Java Exploit (exploit_kit.rules)
- 2019180 - ET EXPLOIT_KIT Malvertising Leading to EK Aug 19 2014 M4 (exploit_kit.rules)
- 2019181 - ET MOBILE_MALWARE Possible Android CVE-2014-6041 (mobile_malware.rules)
- 2019183 - ET EXPLOIT_KIT Fiesta EK Gate (exploit_kit.rules)
- 2019184 - ET EXPLOIT_KIT Fiesta EK Silverlight Based Redirect (exploit_kit.rules)
- 2019190 - ET MALWARE Infostealer.Banprox Proxy.pac Download 2 (malware.rules)
- 2019193 - ET EXPLOIT_KIT RIG EK Landing Page Sept 17 2014 (exploit_kit.rules)
- 2019201 - ET MALWARE Backdoor.Win32/PcClient.AA Checkin (malware.rules)
- 2019242 - ET MALWARE Linux/DDoS.M distributed via CVE-2014-6271 Checkin (malware.rules)
- 2019311 - ET WEB_CLIENT Upatre redirector GET Sept 29 2014 (web_client.rules)
- 2019343 - ET CURRENT_EVENTS FAKEIE 11.0 Minimal Headers (flowbit set) (current_events.rules)
- 2019344 - ET MALWARE FAKEIE Minimal Headers (flowbit set) (malware.rules)
- 2019345 - ET MALWARE Possible CryptoLocker TorComponent DL (malware.rules)
- 2019352 - ET EXPLOIT_KIT Possible Sweet Orange redirection 19 September 2014 (exploit_kit.rules)
- 2019357 - ET MALWARE SpyClicker.ClickFraud Query Instructions CnC Response (malware.rules)
- 2019375 - ET WEB_CLIENT Possible Sweet Orange redirection Oct 8 2014 (web_client.rules)
- 2019385 - ET CURRENT_EVENTS Possible TWiki RCE attempt (current_events.rules)
- 2019395 - ET MALWARE Possible SandWorm INF Download (malware.rules)
- 2019397 - ET MALWARE Possible SandWorm INF Download (UNICODE) (malware.rules)
- 2019400 - ET MALWARE Possible Bedep Connectivity Check (malware.rules)
- 2019456 - ET CURRENT_EVENTS FlashPack Payload URI Struct Oct 16 2014 (current_events.rules)
- 2019461 - ET CURRENT_EVENTS BlackEnergy URI Struct Oct 17 2014 BE1 (current_events.rules)
- 2019462 - ET CURRENT_EVENTS BlackEnergy URI Struct Oct 17 2014 BE2 (current_events.rules)
- 2019463 - ET CURRENT_EVENTS BlackEnergy URI Struct Oct 17 2014 BE3 (current_events.rules)
- 2019464 - ET CURRENT_EVENTS BlackEnergy URI Struct Oct 17 2014 BE4 (current_events.rules)
- 2019465 - ET CURRENT_EVENTS BlackEnergy URI Struct Oct 17 2014 BE5 (current_events.rules)
- 2019479 - ET EXPLOIT_KIT Job314 EK URI Exploit/Payload Struct (exploit_kit.rules)
- 2019480 - ET EXPLOIT_KIT Job314 EK URI Landing Struct (exploit_kit.rules)
- 2019487 - ET CURRENT_EVENTS FlashPack Payload URI Struct Oct 22 2014 (current_events.rules)
- 2019500 - ET MALWARE Vawtrak/NeverQuest Posting Data (malware.rules)
- 2019501 - ET MALWARE Vawtrak/NeverQuest Posting Data (malware.rules)
- 2019542 - ET EXPLOIT_KIT Likely SweetOrange EK Java Exploit Struct (JAR) (exploit_kit.rules)
- 2019546 - ET MALWARE Sofacy HTTP Request adawareblock.com (malware.rules)
- 2019547 - ET MALWARE Sofacy HTTP Request adobeincorp.com (malware.rules)
- 2019548 - ET MALWARE Sofacy HTTP Request azureon-line.com (malware.rules)
- 2019549 - ET MALWARE Sofacy HTTP Request checkmalware.info (malware.rules)
- 2019550 - ET MALWARE Sofacy HTTP Request checkwinframe.com (malware.rules)
- 2019551 - ET MALWARE Sofacy HTTP Request check-fix.com (malware.rules)
- 2019552 - ET MALWARE Sofacy HTTP Request hotfix-update.com (malware.rules)
- 2019553 - ET MALWARE Sofacy HTTP Request microsofi.org (malware.rules)
- 2019555 - ET MALWARE Sofacy HTTP Request scanmalware.info (malware.rules)
- 2019556 - ET MALWARE Sofacy HTTP Request secnetcontrol.com (malware.rules)
- 2019557 - ET MALWARE Sofacy HTTP Request securitypractic.com (malware.rules)
- 2019558 - ET MALWARE Sofacy HTTP Request testservice24.net (malware.rules)
- 2019559 - ET MALWARE Sofacy HTTP Request testsnetcontrol.com (malware.rules)
- 2019560 - ET MALWARE Sofacy HTTP Request updatepc.org (malware.rules)
- 2019561 - ET MALWARE Sofacy HTTP Request updatesoftware24.com (malware.rules)
- 2019562 - ET MALWARE Sofacy HTTP Request windows-updater.com (malware.rules)
- 2019563 - ET MALWARE Sofacy HTTP Request checkmalware.org (malware.rules)
- 2019583 - ET MALWARE Sofacy HTTP Request symanttec.org (malware.rules)
- 2019585 - ET MALWARE Sofacy HTTP Request msonlinelive.com (malware.rules)
- 2019595 - ET MALWARE FlashPack Payload Download Oct 29 (malware.rules)
- 2019596 - ET WEB_CLIENT FlashPack Secondary Landing Oct 29 (web_client.rules)
- 2019600 - ET EXPLOIT_KIT Likely SweetOrange EK Java Exploit Struct (JNLP) (exploit_kit.rules)
- 2019610 - ET MALWARE Possible EITest Flash Redirect (malware.rules)
- 2019611 - ET EXPLOIT Fiesta Java Exploit/Payload URI Struct (exploit.rules)
- 2019623 - ET EXPLOIT Fiesta SilverLight 4.x Exploit URI Struct (exploit.rules)
- 2019626 - ET MALWARE Cohhoc RAT CnC Response (malware.rules)
- 2019630 - ET MALWARE AnubisNetworks Sinkhole HTTP Response - 195.22.26.192/26 (malware.rules)
- 2019634 - ET EXPLOIT_KIT Sweet Orange Landing Nov 3 2014 (exploit_kit.rules)
- 2019638 - ET EXPLOIT_KIT Evil EK Redirector Cookie Nov 03 2014 (exploit_kit.rules)
- 2019641 - ET MALWARE Sofacy HTTP Request malwarecheck.info (malware.rules)
- 2019642 - ET EXPLOIT_KIT Possible Sweet Orange redirection Nov 4 2014 (exploit_kit.rules)
- 2019643 - ET WEB_CLIENT Possible Sweet Orange Landing Nov 3 2014 (web_client.rules)
- 2019644 - ET MALWARE Shellshock Backdoor.Perl.Shellbot.F retrieval (malware.rules)
- 2019647 - ET WEB_CLIENT Sweet Orange Landing Nov 04 2013 (web_client.rules)
- 2019656 - ET EXPLOIT_KIT Archie EK Exploit Flash URI Struct (exploit_kit.rules)
- 2019657 - ET EXPLOIT_KIT Archie EK Exploit Flash URI Struct (exploit_kit.rules)
- 2019658 - ET EXPLOIT_KIT Archie EK Exploit SilverLight URI Struct (exploit_kit.rules)
- 2019659 - ET EXPLOIT_KIT Archie EK Exploit IE URI Struct (exploit_kit.rules)
- 2019672 - ET EXPLOIT_KIT Possible HanJuan EK Flash Payload DL (exploit_kit.rules)
- 2019673 - ET EXPLOIT_KIT Possible HanJuan EK URI Struct Actor Specific (exploit_kit.rules)
- 2019674 - ET EXPLOIT Possible HanJuan Flash Exploit (exploit.rules)
- 2019675 - ET EXPLOIT_KIT Possible HanJuan EK Actor Specific Injected iframe (exploit_kit.rules)
- 2019677 - ET EXPLOIT_KIT Archie EK Exploit Flash URI Struct (exploit_kit.rules)
- 2019681 - ET PHISHING Operation Huyao Landing Page Nov 07 2014 (phishing.rules)
- 2019684 - ET EXPLOIT_KIT Evil EK Redirector Cookie Nov 07 2014 (exploit_kit.rules)
- 2019685 - ET EXPLOIT_KIT Archie EK Landing URI Struct (exploit_kit.rules)
- 2019689 - ET EXPLOIT_KIT Job314 EK Landing Nov 10 2014 (exploit_kit.rules)
- 2019690 - ET EXPLOIT_KIT Archie EK Landing Nov 10 2014 (exploit_kit.rules)
- 2019711 - ET MALWARE W32Autorun.worm.aaeh Checkin (malware.rules)
- 2019722 - ET EXPLOIT_KIT Archie EK Landing Nov 17 2014 (exploit_kit.rules)
- 2019723 - ET EXPLOIT_KIT Archie EK Landing Nov 17 2014 M2 (exploit_kit.rules)
- 2019724 - ET EXPLOIT_KIT Archie EK Flash Exploit URI Struct Nov 17 2014 (exploit_kit.rules)
- 2019725 - ET EXPLOIT_KIT Archie EK Flash Exploit URI Struct 2 Nov 17 2014 (exploit_kit.rules)
- 2019726 - ET EXPLOIT_KIT Archie EK Landing URI Struct 2 Nov 17 2014 (exploit_kit.rules)
- 2019727 - ET EXPLOIT_KIT NullHole EK Exploit URI Struct (exploit_kit.rules)
- 2019742 - ET EXPLOIT_KIT SPL2 EK Landing Nov 18 2014 (exploit_kit.rules)
- 2019743 - ET EXPLOIT_KIT SPL2 EK PluginDetect Data Hash Nov 18 2014 (exploit_kit.rules)
- 2019744 - ET EXPLOIT_KIT SPL2 EK JS HashLib Nov 18 2014 (exploit_kit.rules)
- 2019745 - ET EXPLOIT_KIT SPL2 EK Flash Exploit Nov 18 2014 (exploit_kit.rules)
- 2019751 - ET EXPLOIT_KIT SweetOrange EK Landing Nov 19 2014 (exploit_kit.rules)
- 2019757 - ET MALWARE Bamital Checkin Response 1 (malware.rules)
- 2019768 - ET EXPLOIT_KIT Archie EK T2 PD Struct Nov 20 2014 (exploit_kit.rules)
- 2019769 - ET EXPLOIT_KIT Archie EK T2 Landing Struct Nov 20 2014 (exploit_kit.rules)
- 2019770 - ET EXPLOIT_KIT Archie EK T2 SWF Exploit Struct Nov 20 2014 (exploit_kit.rules)
- 2019775 - ET EXPLOIT_KIT Possible Internet Explorer CVE-2014-6332 Common Construct b64 3 (Observed in Archie EK) (exploit_kit.rules)
- 2019788 - ET MALWARE DNS Query for Suspicious cvredirect.no-ip.net Domain - CoinLocker Domain (malware.rules)
- 2019790 - ET MALWARE DNS Query for Suspicious cvredirect.ddns.net Domain - CoinLocker Domain (malware.rules)
- 2019798 - ET EXPLOIT_KIT Malicious Iframe Leading to EK (exploit_kit.rules)
- 2019799 - ET EXPLOIT Magnitude Flash Exploit (IE) (exploit.rules)
- 2019828 - ET MALWARE Trojan/W32.KRBanker.60928.C Checkin (malware.rules)
- 2019851 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019852 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019853 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019854 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019855 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019856 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019857 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019858 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019859 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019860 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019861 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019862 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019863 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019864 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019865 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019866 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019867 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019868 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019869 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019870 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019871 - ET MALWARE DNS Query for Operation Cleaver Domain (malware.rules)
- 2019892 - ET EXPLOIT_KIT Malicious Iframe Leading to EK Dec 08 2014 (exploit_kit.rules)
- 2019895 - ET EXPLOIT_KIT Malicious Redirect Leading to EK Dec 08 2014 (exploit_kit.rules)
- 2019915 - ET MALWARE Cloud Atlas Request to WebDAV CloudMe (malware.rules)
- 2019916 - ET WEB_CLIENT HanJuan Landing Dec 10 2014 (web_client.rules)
- 2019920 - ET EXPLOIT_KIT Malicious JS Leading to Fiesta EK (exploit_kit.rules)
- 2019939 - ET CURRENT_EVENTS SoakSoak Malware GET request (current_events.rules)
- 2019940 - ET CURRENT_EVENTS DNS Query SoakSoak Malware (soaksoak .ru) (current_events.rules)
- 2019942 - ET MALWARE W32/TinyZBot Checkin (Operation Cleaver) (malware.rules)
- 2019954 - ET WEB_CLIENT Upatre Redirector Dec 16 2014 (web_client.rules)
- 2019970 - ET WEB_CLIENT Upatre Download Redirection Dec 18 2014 (web_client.rules)
- 2019973 - ET EXPLOIT_KIT Archie EK T2 Activity Dec 18 2014 (exploit_kit.rules)
- 2019977 - ET MALWARE W32/Dridex Distribution Campaign Dec 19 2014 (malware.rules)
- 2020021 - ET MALWARE Possible Operation Poisoned Helmand jar download (malware.rules)
- 2020027 - ET MALWARE Win32/Spy.Agent.OHT - AnunakAPT HTTP Checkin 1 (malware.rules)
- 2020028 - ET MALWARE Win32/Spy.Agent.OHT - AnunakAPT HTTP Checkin Response 1 (malware.rules)
- 2020030 - ET MALWARE Win32/Spy.Agent.OHT - AnunakAPT HTTP Checkin Response 2 (malware.rules)
- 2020067 - ET EXPLOIT Possible CVE-2014-6332 Arrays with Offset Dec 23 (exploit.rules)
- 2804397 - ETPRO EXPLOIT Avaya WinPDM UniteHostRouter Stack Buffer Overflow (exploit.rules)
- 2804567 - ETPRO EXPLOIT Citrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020000 Buffer Overflow (exploit.rules)
- 2804832 - ETPRO MALWARE PWS.Win32/Zbot.gen!AF CnC traffic (malware.rules)
- 2804838 - ETPRO MALWARE Savit.A Checkin (malware.rules)
- 2804862 - ETPRO MALWARE HackTool.Win32.Binder.bs Checkin (malware.rules)
- 2804889 - ETPRO MALWARE Trojan.Win32.Buzus.lbxv CnC traffic (malware.rules)
- 2805008 - ETPRO MALWARE W32/Refroso.DZP!tr sending info via SMTP (malware.rules)
- 2805012 - ETPRO MALWARE Spyware.Keylogger!rem (malware.rules)
- 2805039 - ETPRO MALWARE Pykspa.A Checkin (malware.rules)
- 2805094 - ETPRO MALWARE W32/VB.POZ!tr.dldr exec SQL command (exec retorna dados) (malware.rules)
- 2805143 - ETPRO EXPLOIT Possible WORM W32.Printlove spreading via cve 2010-2729 (exploit.rules)
- 2805183 - ETPRO EXPLOIT Novell ZENworks Configuration Management Preboot Service Remote File Access (exploit.rules)
- 2805213 - ETPRO MALWARE Trojan-Banker.Win32.Banker.stku Checkin SQL (malware.rules)
- 2805293 - ETPRO MALWARE TrojanSpy.Win32/ProAgent.A Sending Info via SMTP (malware.rules)
- 2805308 - ETPRO MALWARE PSWTool.Win32.NetPass.baq sending stolen info via SMTP (malware.rules)
- 2805342 - ETPRO MALWARE Mdropper CnC (malware.rules)
- 2805350 - ETPRO MALWARE Variant.Graftor.17107 Checkin (malware.rules)
- 2805371 - ETPRO MALWARE Email-Worm.Win32.Mimail.l ICMP Timestamp Request (malware.rules)
- 2805404 - ETPRO MALWARE Linux/Wirenet keep-alive outbound (malware.rules)
- 2805443 - ETPRO MALWARE Dadobra.flw/Malagent UDP Response from CnC (malware.rules)
- 2805462 - ETPRO SQL PostgreSQL xml_parse() DTD validation read arbitrary files read 1 (sql.rules)
- 2805463 - ETPRO SQL PostgreSQL xslt_process() DTD validation read arbitrary files read 2 (sql.rules)
- 2805474 - ETPRO MALWARE Win32.Dorifel.eav IRC login (malware.rules)
- 2805501 - ETPRO MALWARE Backdoor.Win32.Rbot.bzc IRC Log in (malware.rules)
- 2805611 - ETPRO MALWARE Backdoor.Win32.Xdoor.21 Checkin (malware.rules)
- 2805747 - ETPRO MALWARE Win32/Zegost.B CnC (malware.rules)
- 2805770 - ETPRO MALWARE Backdoor.Hallifez.A Trojan Checkin (malware.rules)
- 2805848 - ETPRO MOBILE_MALWARE Exploit.Andr.Lotoor Checkin (mobile_malware.rules)
- 2807426 - ETPRO MALWARE Trojan.Win32.Badur.gboh Download (malware.rules)
- 2807433 - ETPRO MALWARE Win32/Agent.QCD Checkin 3 (malware.rules)
- 2807434 - ETPRO MALWARE Trojan.Win32.Agent.adecj Checkin (malware.rules)
- 2807452 - ETPRO MALWARE Trojan-Clicker.Win32.Agent.aaut Checkin 2 (malware.rules)
- 2807468 - ETPRO MALWARE TrojanDownloader Win32/Unruy.C Checkin 3 (malware.rules)
- 2807476 - ETPRO MALWARE Win32/TrojanDownloader.Onkods.V Download (malware.rules)
- 2807477 - ETPRO MALWARE Trojan-Downloader.Win32.Agent.bofr Checkin (malware.rules)
- 2807500 - ETPRO MALWARE Trojan-Downloader.Win32.Agent.aah Checkin (malware.rules)
- 2807507 - ETPRO MALWARE Win32.Foreign.jowy 2 (malware.rules)
- 2807548 - ETPRO MALWARE Win32.VJadtre.2 Checkin (malware.rules)
- 2807571 - ETPRO MALWARE W32/Agent.EW.gen Checkin (malware.rules)
- 2807586 - ETPRO MALWARE Win32.Magania Response (malware.rules)
- 2807618 - ETPRO MALWARE Win32/TrojanDownloader.Banload.ROP Response (malware.rules)
- 2807638 - ETPRO MALWARE Win32.Androm.atfw (malware.rules)
- 2807668 - ETPRO MALWARE W32/KeyLogger.OFP!tr.spy Response (malware.rules)
- 2807695 - ETPRO MALWARE Win32/Tocoomu.A Checkin (malware.rules)
- 2807716 - ETPRO MOBILE_MALWARE AndroidOS/Sumzand.A Checkin (mobile_malware.rules)
- 2807741 - ETPRO MOBILE_MALWARE Backdoor.AndroidOS.Fakengry.b Checkin 2 (mobile_malware.rules)
- 2807753 - ETPRO MALWARE Trojan.Win32.Agentb.aoii Checkin (malware.rules)
- 2807763 - ETPRO MALWARE Win32/Hider.G GET .ini Request (malware.rules)
- 2807797 - ETPRO MALWARE Trojan-Dropper.Win32.Dorifel.ahba Checkin (malware.rules)
- 2807837 - ETPRO MALWARE Trojan-Spy.Win32.Polyatroj.pej Checkin via Gadu-Gadu (malware.rules)
- 2807841 - ETPRO MALWARE Trojan-Spy.Win32.KeyLogger.tr via Gadu-Gadu (malware.rules)
- 2807900 - ETPRO MALWARE TrojanProxy.Wintu.B Checkin (malware.rules)
- 2807901 - ETPRO MALWARE RemoteAdmin.Win32.RAdmin Request (malware.rules)
- 2807918 - ETPRO MALWARE Trojan-Ransom.Win32.Blocker.avsx Checkin Response (malware.rules)
- 2807919 - ETPRO MALWARE Trojan-Ransom.Win32.Blocker.avsx Checkin Response 2 (malware.rules)
- 2807955 - ETPRO MALWARE Win32/Injector.Autoit.ZZ (malware.rules)
- 2807967 - ETPRO MALWARE Backdoor.Win32.Destrukor.20 Checkin (malware.rules)
- 2807998 - ETPRO EXPLOIT Possible CVE-2014-0515 Flash Buffer Overflow (exploit.rules)
- 2808007 - ETPRO MOBILE_MALWARE Android/DroidRooter.B Checkin (mobile_malware.rules)
- 2808014 - ETPRO MOBILE_MALWARE Trojan-Spy.AndroidOS.SmForw.o Checkin 4 (mobile_malware.rules)
- 2808020 - ETPRO MALWARE Agent-AEMM Checkin Response (malware.rules)
- 2808032 - ETPRO MALWARE Win32/Zbot.BX Checkin (malware.rules)
- 2808052 - ETPRO MOBILE_MALWARE Android.Riskware.SmsPay.C Checkin (mobile_malware.rules)
- 2808054 - ETPRO MALWARE MSIL/RapidStealer.A FTP Activity 1 (set) (malware.rules)
- 2808056 - ETPRO MALWARE MSIL/RapidStealer.A FTP Activity 2 (set) (malware.rules)
- 2808099 - ETPRO MALWARE qq.com C2 - SET (malware.rules)
- 2808100 - ETPRO MALWARE qq.com C2 response (malware.rules)
- 2808155 - ETPRO WEB_SERVER Microsoft Lync Server XSS attempt (CVE-2014-1823) (web_server.rules)
- 2808207 - ETPRO EXPLOIT_KIT Safe/Critx/FlashPack URI Struct June 18 2014 1 (exploit_kit.rules)
- 2808208 - ETPRO EXPLOIT_KIT Safe/Critx/FlashPack URI Struct June 18 2014 2 (exploit_kit.rules)
- 2808212 - ETPRO EXPLOIT_KIT Safe/Critx/FlashPack URI Struct June 19 2014 1 (exploit_kit.rules)
- 2808213 - ETPRO EXPLOIT_KIT Safe/Critx/FlashPack URI Struct June 19 2014 2 (exploit_kit.rules)
- 2808220 - ETPRO MALWARE W32/Redyms.AF Checkin 2 (malware.rules)
- 2808252 - ETPRO MALWARE W32.Injector.13824.C config update pull (malware.rules)
- 2808265 - ETPRO MALWARE Trojan.Win32.FrauDrop.dbnyoz Checkin 2 (malware.rules)
- 2808285 - ETPRO MALWARE Win32.Tooka.a Checkin (malware.rules)
- 2808286 - ETPRO MALWARE Passwrd Stealer Win32/Zediv.A Checkin (malware.rules)
- 2808293 - ETPRO MOBILE_MALWARE Android/RedMobile.B Checkin (mobile_malware.rules)
- 2808306 - ETPRO MALWARE Virus.Win32.Virut.ce Checkin 7 (malware.rules)
- 2808308 - ETPRO MOBILE_MALWARE Trojan-SMS.AndroidOS.Elpso.a Checkin (mobile_malware.rules)
- 2808313 - ETPRO MALWARE Win32.Tavex.A Checkin 2 (malware.rules)
- 2808325 - ETPRO EXPLOIT_KIT SweetOrange EK Thread Specific Landing URI Struct Jul 10 2014 (exploit_kit.rules)
- 2808326 - ETPRO MALWARE Trojan.Win32.Scar.hypv Checkin (malware.rules)
- 2808333 - ETPRO ADWARE_PUP W32/OnlineGames.HI.gen!Eldorado Checkin (adware_pup.rules)
- 2808346 - ETPRO MALWARE CT RAT (malware.rules)
- 2808348 - ETPRO MOBILE_MALWARE Android.Trojan.Voxv.A Checkin (mobile_malware.rules)
- 2808350 - ETPRO MOBILE_MALWARE Android.Trojan.Voxv.A Checkin 3 (mobile_malware.rules)
- 2808359 - ETPRO ADWARE_PUP Facemoi Adware Installer Download (adware_pup.rules)
- 2808374 - ETPRO MOBILE_MALWARE Android.Trojan.InfoStealer.CM Checkin (mobile_malware.rules)
- 2808376 - ETPRO MOBILE_MALWARE Android.Trojan.SMSSend.RZ Checkin 2 (mobile_malware.rules)
- 2808377 - ETPRO MOBILE_MALWARE Android.Trojan.SMSSend.IA Checkin (mobile_malware.rules)
- 2808381 - ETPRO EXPLOIT_KIT SweetOrange EK Thread 2 Specific Landing URI Struct Jul 16 2014 (exploit_kit.rules)
- 2808409 - ETPRO MOBILE_MALWARE Android.Riskware.SmsPay.D Checkin (mobile_malware.rules)
- 2808450 - ETPRO RETIRED REVETON CnC SET (retired.rules)
- 2808459 - ETPRO EXPLOIT Omeka 2.2 CSRF Add Persistent XSS (exploit.rules)
- 2808460 - ETPRO EXPLOIT Omeka 2.2 CSRF Disable Fie Validation (exploit.rules)
- 2808485 - ETPRO ADWARE_PUP Win32/AdWare.ICLoader.A Checkin (adware_pup.rules)
- 2808487 - ETPRO MOBILE_MALWARE Worm.AndroidOS.Samsapo Checkin (mobile_malware.rules)
- 2808513 - ETPRO MOBILE_MALWARE Android/SmsSpy.AS Checkin 2 (mobile_malware.rules)
- 2808521 - ETPRO MOBILE_MALWARE Trojan-Ransom.AndroidOS.Aples.a Checkin (mobile_malware.rules)
- 2808523 - ETPRO MOBILE_MALWARE Backdoor.AndroidOS.Ssucl.a Checkin (mobile_malware.rules)
- 2808559 - ETPRO MOBILE_MALWARE Trojan-SMS.AndroidOS.Funtasy.a Checkin (mobile_malware.rules)
- 2808562 - ETPRO MOBILE_MALWARE Trojan-Spy.AndroidOS.Recal.a Checkin 2 (mobile_malware.rules)
- 2808583 - ETPRO MOBILE_MALWARE Android.Gabas.A Checkin (mobile_malware.rules)
- 2808589 - ETPRO MOBILE_MALWARE Android/Maver.A Checkin (mobile_malware.rules)
- 2808606 - ETPRO MOBILE_MALWARE Trojan.AndroidOS.Wirec.a Checkin (mobile_malware.rules)
- 2808607 - ETPRO MOBILE_MALWARE Trojan.AndroidOS.Wirec.a Checkin 2 (mobile_malware.rules)
- 2808615 - ETPRO MOBILE_MALWARE Trojan.AndroidOS.MTK.d Checkin (mobile_malware.rules)
- 2808616 - ETPRO MOBILE_MALWARE Android/SMSreg.HS Checkin (mobile_malware.rules)
- 2808647 - ETPRO MALWARE Backdoor.Win32.Stantinko.A Checkin (malware.rules)
- 2808658 - ETPRO EXPLOIT_KIT FlashPack URI Struct Thread 1 Specific (exploit_kit.rules)
- 2808659 - ETPRO EXPLOIT_KIT FlashPack URI Struct Thread 2 Specific (exploit_kit.rules)
- 2808673 - ETPRO MOBILE_MALWARE Android/Spyoo.I Checkin (mobile_malware.rules)
- 2808684 - ETPRO MOBILE_MALWARE Trojan.AndroidOS.Talp.a Checkin (mobile_malware.rules)
- 2808704 - ETPRO ADWARE_PUP PUP Win32/Adware.MediaFinder Checkin 2 (adware_pup.rules)
- 2808705 - ETPRO MOBILE_MALWARE Android/SmsSpy.AH Checkin (mobile_malware.rules)
- 2808720 - ETPRO MOBILE_MALWARE Android/Univert.B Checkin (mobile_malware.rules)
- 2808722 - ETPRO MOBILE_MALWARE Android/Tekwon.A Checkin 3 (mobile_malware.rules)
- 2808747 - ETPRO MOBILE_MALWARE Android/Tekwon.A Checkin 4 (mobile_malware.rules)
- 2808750 - ETPRO EXPLOIT_KIT Flashpack EK Thread 3 Sep 05 2014 (exploit_kit.rules)
- 2808773 - ETPRO MOBILE_MALWARE Android/Koler.B Checkin (mobile_malware.rules)
- 2808777 - ETPRO MOBILE_MALWARE Android.Svpeng.D Checkin (mobile_malware.rules)
- 2808784 - ETPRO MOBILE_MALWARE Android/TrojanSMS.Hippo.Q Checkin (mobile_malware.rules)
- 2808785 - ETPRO MOBILE_MALWARE RiskTool.AndroidOS.SMSreg.dc Checkin (mobile_malware.rules)
- 2808805 - ETPRO MALWARE Win32/Cendelf.gen!A checkin (malware.rules)
- 2808825 - ETPRO MOBILE_MALWARE Android/Agent.CI!tr Checkin (mobile_malware.rules)
- 2808827 - ETPRO MOBILE_MALWARE Trojan-SMS.AndroidOS.Agent.bz Checkin (mobile_malware.rules)
- 2808838 - ETPRO MOBILE_MALWARE Trojan-Banker.AndroidOS.Wroba.o Checkin (mobile_malware.rules)
- 2808840 - ETPRO POLICY WebSocket Session Initiation Response (policy.rules)
- 2808842 - ETPRO MOBILE_MALWARE Android/Agent.FP Checkin (mobile_malware.rules)
- 2808846 - ETPRO MALWARE Win32.Banload Variant Checkin (malware.rules)
- 2808854 - ETPRO MALWARE TROJANCLICKER.MSIL/EZBRO.A Checkin (malware.rules)
- 2808857 - ETPRO MOBILE_MALWARE Trojan-SMS.AndroidOS.FakeInst.a Checkin 5 (mobile_malware.rules)
- 2808882 - ETPRO MOBILE_MALWARE Android.Trojan.AutoSMS.BF Checkin (mobile_malware.rules)
- 2808888 - ETPRO MALWARE Win32/BrowserPassview Checkin via SMTP 2 (malware.rules)
- 2808894 - ETPRO MOBILE_MALWARE Android.Trojan.Magwei.A Checkin (mobile_malware.rules)
- 2808897 - ETPRO MOBILE_MALWARE AndroidOS.Ifacefone.A Checkin (mobile_malware.rules)
- 2808910 - ETPRO MALWARE Trojan-Spy.MSIL.KeyLogger.babx Checkin (malware.rules)
- 2808938 - ETPRO MOBILE_MALWARE Trojan.AndroidOS.Koler.d Checkin (mobile_malware.rules)
- 2808954 - ETPRO MOBILE_MALWARE AndroidOS.GoldDream.U Checkin (mobile_malware.rules)
- 2808955 - ETPRO MOBILE_MALWARE Android/Ksapp.L Checkin (mobile_malware.rules)
- 2808956 - ETPRO MOBILE_MALWARE Backdoor.AndroidOS.Helir.f Checkin (mobile_malware.rules)
- 2808958 - ETPRO MALWARE Backdoor.Cakwerd Dropping Files (malware.rules)
- 2808962 - ETPRO MOBILE_MALWARE Android/Pholoc.C Checkin (mobile_malware.rules)
- 2808963 - ETPRO MOBILE_MALWARE Android/Pholoc.C Checkin 2 (mobile_malware.rules)
- 2808973 - ETPRO MOBILE_MALWARE Trojan-Spy.AndroidOS.Agent.bo Checkin (mobile_malware.rules)
- 2808978 - ETPRO MOBILE_MALWARE Android/Selfmite.A Checkin 2 (mobile_malware.rules)
- 2809008 - ETPRO MOBILE_MALWARE Trojan-SMS.AndroidOS.Agent.op Checkin (mobile_malware.rules)
- 2809010 - ETPRO MOBILE_MALWARE Backdoor.AndroidOS.Zerat.a / DroidJack RAT Checkin (mobile_malware.rules)
- 2809020 - ETPRO MALWARE RDN/Spybot.bfr (malware.rules)
- 2809027 - ETPRO MOBILE_MALWARE Android.Fjcon.B Checkin (mobile_malware.rules)
- 2809074 - ETPRO MALWARE WIN32.AGENT.AGLKL Checkin (malware.rules)
- 2809120 - ETPRO MOBILE_MALWARE Trojan-SMS.AndroidOS.FakeInst.a Checkin 6 (mobile_malware.rules)
- 2809121 - ETPRO MOBILE_MALWARE Trojan-SMS.AndroidOS.FakeInst.a Checkin 7 (mobile_malware.rules)
- 2809133 - ETPRO MOBILE_MALWARE Backdoor.AndroidOS.Seldor.d Checkin (mobile_malware.rules)
- 2809170 - ETPRO MALWARE PE downloaded with malicious APT OPH certificate (QTI International Inc) (malware.rules)
- 2809173 - ETPRO MOBILE_MALWARE Android.Riskware.SmsSend.WUG Checkin (mobile_malware.rules)
- 2809216 - ETPRO MOBILE_MALWARE Android.Trojan.SmsSpy.FS Checkin (mobile_malware.rules)
- 2809221 - ETPRO MOBILE_MALWARE Monitor.AndroidOS.SilTracker.a Checkin (mobile_malware.rules)
- 2809234 - ETPRO MOBILE_MALWARE Trojan.AndroidOS.FakePrin.a Checkin (mobile_malware.rules)
- 2809245 - ETPRO MOBILE_MALWARE Trojan.AndroidOS.FakeDebugger Checkin (mobile_malware.rules)
- 2809249 - ETPRO MALWARE Backdoor.MSIL.Soaphrish.A checkin (malware.rules)
- 2809268 - ETPRO MALWARE W32/PVZ-In Checkin (Operation Cleaver) (malware.rules)
- 2809276 - ETPRO MALWARE W32/TinyZBot v1 Checkin (Operation Cleaver) (malware.rules)
- 2809322 - ETPRO MALWARE Jaik Variant Checkin Response (malware.rules)
- 2809334 - ETPRO MALWARE VBS/Cechip.A SSH Banner Checkin (malware.rules)
- 2809342 - ETPRO MOBILE_MALWARE Android/TrojanSMS.Feejar.A Checkin (mobile_malware.rules)
- 2809357 - ETPRO MOBILE_MALWARE Trojan-Banker.AndroidOS.Wroba.b Checkin 2 (mobile_malware.rules)
- 2809362 - ETPRO MOBILE_MALWARE Trojan-Banker.AndroidOS.Wroba.f Checkin (mobile_malware.rules)
- 2809388 - ETPRO MOBILE_MALWARE Android Unknown Trojan Checkin (mobile_malware.rules)
- 2809389 - ETPRO MOBILE_MALWARE Android/TrojanSMS.Agent.AHS Checkin (mobile_malware.rules)
- 2809424 - ETPRO MOBILE_MALWARE Trojan-Spy.AndroidOS.SmForw.h Checkin (mobile_malware.rules)
- 2809427 - ETPRO USER_AGENTS IE 10 on Windows 3.1 (user_agents.rules)