Summary: 2025/04/25 00:25

First reported date: 2023/10/27
Inquiry period : 2025/04/24 00:25 ~ 2025/04/25 00:25 (1 days), 2 search results

지난 7일 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형
LPEClient Volgmer Bankshot RATel Maze 도 새롭게 확인됩니다.
공격자 Lazarus 도 새롭게 확인됩니다.
공격기술 Campaign APT 도 새롭게 확인됩니다.
기관 및 기업 Kaspersky Microsoft South Korea United Kingdom United States dprk North Korea 도 새롭게 확인됩니다.
기타 Update innorix Malicious Traffic Cryptocurrency Victim 등 신규 키워드도 확인됩니다.

LPEClient is an HTTP(S) downloader that expects two command line parameters: an encrypted string containing two URLs (a primary and a secondary C&C server), and the path on the victim's file system to store the downloaded payload.

It sends detailed information about the victim's environment, like computer name, type and number of processors, computer manufacturer, product name, major and minor Windows versions, architecture, memory information, installed security software and the version of the ntoskrnl.exe from its version-information resource.

LPEClient uses specific 32-bit values to represent its execution state (0x59863F09 when connecting via the WinHTTP interface, 0xA9348B57 via WinINet), or the nature of HTTP requests to the C&C servers (0xF07D6B34 when sending system information, 0xEF8C0D51 when requesting a DLL payload, 0xCB790A25 when reporting the successful loading of the DLL, 0xD7B20A96 when reporting the state of the the DLL execution). As the final step, malware looks for the export CloseEnv and executes it.  Ref.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/24 Operation SyncHole: Lazarus APT goes back to the well


참고로 동일한 그룹의 악성코드 타입은 SmokeLoader GuLoader Zloader 등 47개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Lazarus 2 ▲ new
2LPEClient 2 ▲ new
3Update 2 ▲ new
4Campaign 2 ▲ new
5Kaspersky 2 ▲ new
6innorix 1 ▲ new
7Malicious Traffic 1 ▲ new
8Cryptocurrency 1 ▲ new
9Victim 1 ▲ new
10Microsoft 1 ▲ new
11South Korea 1 ▲ new
12IoC 1 ▲ new
13United Kingdom 1 ▲ new
14EDR 1 ▲ new
15Volgmer 1 ▲ new
16Bankshot 1 ▲ new
17RATel 1 ▲ new
18UNIX 1 ▲ new
19Windows 1 ▲ new
20ZeroDay 1 ▲ new
21c&c 1 ▲ new
22Malware 1 ▲ new
23United States 1 ▲ new
24cti 1 ▲ new
25signbt 1 ▲ new
26synchole 1 ▲ new
27threatneedle 1 ▲ new
28agamemnon 1 ▲ new
29crossex 1 ▲ new
30dprk 1 ▲ new
31APT 1 ▲ new
32Report 1 ▲ new
33toolset 1 ▲ new
34hole 1 ▲ new
35attack 1 ▲ new
36North Korea 1 ▲ new
37Maze 1 ▲ new
38Vulnerability 1 ▲ new
39RSA Conference 1 ▲ new
40Ex 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
LPEClient
2 (33.3%)
Volgmer
1 (16.7%)
Bankshot
1 (16.7%)
RATel
1 (16.7%)
Maze
1 (16.7%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Lazarus
2 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
2 (66.7%)
APT
1 (33.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Kaspersky
2 (25%)
Microsoft
1 (12.5%)
South Korea
1 (12.5%)
United Kingdom
1 (12.5%)
United States
1 (12.5%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Additional information

Beta Service, If you select keyword, you can check detailed information.