Summary: 2025/04/19 11:18

First reported date: 2012/03/06
Inquiry period : 2025/03/20 11:18 ~ 2025/04/19 11:18 (1 months), 6 search results

전 기간대비 50% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
DLL 입니다.
악성코드 유형 ShadowPad 도 새롭게 확인됩니다.
공격기술 apt 도 새롭게 확인됩니다.
기타 g0njxa actor lure DeepSeek TookPS 등 신규 키워드도 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1DLL 6 ▲ 3 (50%)
2g0njxa 1 ▲ new
3Malware 1 ▼ -1 (-100%)
4actor 1 ▲ new
5lure 1 ▲ new
6DeepSeek 1 ▲ new
7TookPS 1 ▲ new
8Do 1 ▲ new
9CharlesLydgate 1 ▲ new
10xAdvSec 1 ▲ new
11Campaign 1 - 0 (0%)
12hexe 1 ▲ new
13Malicious 1 ▲ new
14msimg 1 ▲ new
15File 1 - 0 (0%)
16IoC 1 - 0 (0%)
17ShadowPad 1 ▲ new
18delete 1 ▲ new
19apt 1 ▲ new
20flaxtyphoon 1 ▲ new
21Hash 1 ▲ new
22Parents 1 ▲ new
23Execution 1 ▲ new
24Same 1 ▲ new
25Password 1 ▲ new
26Bat 1 ▲ new
27httpstcorSZDzbLcCL 1 ▲ new
28httpstcobTb 1 ▲ new
29Zip 1 ▲ new
30sample 1 - 0 (0%)
31please 1 ▲ new
32httpstcookaMxLx 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
ShadowPad
1 (100%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
1 (50%)
apt
1 (50%)
Country & Company
Country & Company

This is a country or company that is an issue.


No data.

Additional information

No Title Date
1StaryDobry ruins New Year’s Eve, delivering miner instead of presents - Malware.News2025.02.18
2StaryDobry ruins New Year’s Eve, delivering miner instead of presents - Malware.News2025.02.18
3Qbot is Back.Connect - Malware.News2025.01.20
4Qbot is Back.Connect - Malware.News2025.01.20
5Qbot is Back.Connect - Malware.News2025.01.20
View only the last 5
Level Description
danger File has been identified by 54 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Installs itself for autorun at Windows startup
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info Queries for the computername
info This executable has a PDB path
Network ET POLICY NetSupport GeoLocation Lookup Request
No data
No URL CC ASN Co Reporter Date
1https://github.com/citraadvertising/X/raw/refs/heads/main/log2.dll
dll
US USMICROSOFT-CORP-MSN-AS-BLOCKabuse_ch2025.04.11
2https://github.com/RQ3Xd/1/raw/refs/heads/main/quas.dll
dll QuasarRAT
US USMICROSOFT-CORP-MSN-AS-BLOCKabuse_ch2025.04.11
3https://github.com/RQ3Xd/1/raw/refs/heads/main/log.dll
dll
US USMICROSOFT-CORP-MSN-AS-BLOCKabuse_ch2025.04.11
4https://downloadbanny.b-cdn.net/SuperPack/private/841921513_x64.dll
dll
JP JPabuse_ch2025.04.02
5http://45.93.20.28/c66c0eade263c9a8/mozglue.dll
dll Stealc
NL NLCOGENT-174DaveLikesMalwre2025.03.27
View only the last 5
Beta Service, If you select keyword, you can check detailed information.