Summary: 2025/04/19 11:29

First reported date: 2020/05/15
Inquiry period : 2025/03/20 11:29 ~ 2025/04/19 11:29 (1 months), 2 search results

전 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형
Dbatloader SmokeLoader Ransomware FakeUpdates ModiLoader GootLoader 도 새롭게 확인됩니다.
공격기술 Phishing Campaign MalSpam 도 새롭게 확인됩니다.
기관 및 기업 Taiwan 도 새롭게 확인됩니다.
기타 ThreatProtection attack Update Malware spyware 등 신규 키워드도 확인됩니다.

According to PCrisk, BATLOADER is part of the infection chain where it is used to perform the initial compromise. This malware is used to execute payloads like Ursnif. Our team has discovered BATLOADER after executing installers for legitimate software (such as Zoom, TeamViewer Visual Studio) bundled with this malware. We have found those installers on compromised websites.  Ref.

참고로 동일한 그룹의 악성코드 타입은 SmokeLoader GuLoader Zloader 등 47개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Dbatloader 2 ▲ new
2ThreatProtection 1 ▲ new
3SmokeLoader 1 ▲ new
4attack 1 ▲ new
5Update 1 ▲ new
6Phishing 1 ▲ new
7Ransomware 1 ▲ new
8FakeUpdates 1 ▲ new
9Malware 1 ▲ new
10spyware 1 ▲ new
11Endgame 1 ▲ new
12cybercrime 1 ▲ new
13Operation 1 ▲ new
14Europols 1 ▲ new
15Taiwan 1 ▲ new
16SCR 1 ▲ new
17ModiLoader 1 ▲ new
18Campaign 1 ▲ new
19MalSpam 1 ▲ new
20GootLoader 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Dbatloader
2 (28.6%)
SmokeLoader
1 (14.3%)
Ransomware
1 (14.3%)
FakeUpdates
1 (14.3%)
ModiLoader
1 (14.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Phishing
1 (33.3%)
Campaign
1 (33.3%)
MalSpam
1 (33.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Taiwan
1 (100%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Additional information

No Title Date
1Warning Against ModiLoader (DBatLoader) Spreading via MS Windows CAB Header Batch File (*.cmd) - ASEC BLOG2025.01.14
2Phishing targeting Polish SMBs continues via ModiLoader - Eset2024.07.30
3CMD파일로 유포되는 DBatLoader - Ahnlab/ASEC2024.06.21
4ESRC 주간 Email 위협 통계 (5월 넷째주) - 이스트시큐리티 알약 블로그...2024.05.21
5ESRC 주간 Email 위협 통계 (5월 넷째주) - 이스트시큐리티 알약 블로그...2024.05.21
View only the last 5
Level Description
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No URL CC ASN Co Reporter Date
1https://cml.lk/doc/r.txt
DBatLoader ModiLoader opendir rat RemcosRAT
SG SGDIGITALOCEAN-ASNabuse_ch2025.04.17
2https://link.storjshare.io/raw/jxhn64sg5f3hjwqbbctalsw4ivsa/office/r.txt
DBatLoader Formbook ModiLoader
US USSPIRITTEL-ASabuse_ch2025.04.17
3https://doc-sharepoint.nbcoiling.com/index.php/s/iRa8xZKGecLG8mZ/download/output.dat
DBatLoader encrypted ModiLoader
US USCLOUDFLARENETabuse_ch2025.04.15
4http://192.3.26.143/440/hkcmd.exe
DBatLoader exe Formbook opendir
US USAS-COLOCROSSINGabuse_ch2025.04.15
5https://huadongrubbercable.com/customer-order/friday/r.txt
ascii DBatLoader Encoded ModiLoader rat RemcosRAT
US USNAMECHEAP-NETabuse_ch2025.04.11
View only the last 5
Beta Service, If you select keyword, you can check detailed information.