Summary: 2025/05/05 06:33

First reported date: 2010/06/28
Inquiry period : 2025/04/05 06:33 ~ 2025/05/05 06:33 (1 months), 6 search results

전 기간대비 -217% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Java Microsoft Criminal Victim File 입니다.
악성코드 유형 Vawtrak BLINDINGCAN ShadowPad 도 새롭게 확인됩니다.
공격자 Lazarus 도 새롭게 확인됩니다.
공격기술 RCE hacking ClickFix APT 도 새롭게 확인됩니다.
기관 및 기업 Government North Korea South Korea 도 새롭게 확인됩니다.
기타 Cryptocurrency SMB open source AnyDesk 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/10 Atomic and Exodus crypto wallets targeted in malicious npm campaign
    ㆍ 2025/04/10 Atomic and Exodus crypto wallets targeted in malicious npm campaign
    ㆍ 2025/04/10 GOFFEE continues to attack organizations in Russia

Trend graph by period


Related keyword cloud
Top 100

DownloaderCampaignUpdatetargetSoftwareJavaMicrosoftCriminalRCEVictimc&cReportMalwareattackFileCryptocurrencyhijackWindowsHijackingmaliciousIoCpackageDistributionPhishingUnited StatesRussiaKasperskyVBScriptpowershellSMBOperationGameoverP2PVawtrakAdvertisingEmailGovernmentopensourceTrojanAnyDeskSupply chainStealerNetWireRCArcanaLoaderampNorth KoreaSouth KoreaschtasksAhnLabBLINDINGCANhackingGitHubTwitterRATBackdooriCloudClickFix악성코드cheat악성패키지공격FlaxTyphoonAPTShadowPadC2TargetingLazarusThinktwicefreeAtomic
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
GameoverP2P
1 (14.3%)
Vawtrak
1 (14.3%)
Trojan
1 (14.3%)
NetWireRC
1 (14.3%)
BLINDINGCAN
1 (14.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Lazarus
1 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Downloader
6 (24%)
Campaign
5 (20%)
RCE
3 (12%)
hijack
2 (8%)
Hijacking
2 (8%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Microsoft
3 (30%)
United States
1 (10%)
Russia
1 (10%)
Kaspersky
1 (10%)
Government
1 (10%)
Threat info
Last 5

Additional information

No Request Hash(md5) Report No Date
1 download.php
Gen1 Emotet Generic Malware PhysicalDrive Themida Downloader Malicious Library UPX Malicious Packer Antivirus Admin Tool (Sysinternals etc ...) .NET framework(MSIL) Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sn
495905a33187563768a8e210f43bc31f605002025.05.04
2 Dtaqbmza.bat
Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM
631af5a8e1f4d742039f3b49886e4af9604972025.05.04
3 de.bat
Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PowerShell
034781001aa560c6139e956ab778a98b605012025.05.04
4 random.exe
Generic Malware Downloader UPX Malicious Library Malicious Packer Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P Anti_VM AntiDebug AntiVM PE File P
117e92efaeb6e9ce06d12865a522e455604682025.05.03
5miastotogra.jpg.webp
Client SW User Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Http API PWS Code injection Create Service Socket DGA ScreenShot Escalate priviledges Steal credential Sniff Audio HTTP DNS BitCoin Internet API persistenc
8334cacd63d376386de8d905a38211cb604072025.05.02
View only the last 5
Level Description
watch A process performed obfuscation on information about the computer or sent it to a remote location indicative of CnC Traffic/Preperations.
watch Attempts to identify installed AV products by installation directory
watch Attempts to stop active services
watch Checks for the presence of known devices from debuggers and forensic tools
watch Checks for the presence of known windows from debuggers and forensic tools
watch Checks the version of Bios
watch Communicates with host for which no DNS query was performed
watch Creates known SpyNet files
watch Deletes executed files from disk
watch Detects the presence of Wine emulator
watch Detects VMWare through the in instruction feature
watch Harvests credentials from local FTP client softwares
watch Installs itself for autorun at Windows startup
watch Putty Files
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process ramez.exe
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries
notice Expresses interest in specific running processes
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice Queries for potentially installed applications
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Tries to locate where the browsers are installed
Network ET DROP Spamhaus DROP Listed Traffic Inbound group 32
Network ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
Network ET INFO Executable Download from dotted-quad Host
Network ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
Network ET INFO Packed Executable Download
Network ET MALWARE Amadey CnC Response
Network ET POLICY PE EXE or DLL Windows file download HTTP
No data
No URL CC ASN Co Reporter Date
1http://147.124.216.113/image.exe
DBatLoader downloader malware trojan VIPKeylogger
US USAC-AS-1Joker2025.01.03
2https://hybrid-independently-eve-hint.trycloudflare.com/om.js
downloader js obfuscated opendir webdav
DaveLikesMalwre2024.12.29
3http://37.120.234.31/Update-KB5005101.zip
bat downloader Encoded opendir reverseshell
RO ROSecure Data Systems SRLDaveLikesMalwre2024.12.10
4https://hoteltoscanaplaza.com.co/Index.txt
downloader js
US USUNIFIEDLAYER-AS-1DaveLikesMalwre2024.11.03
5https://rartxt41.b-cdn.net/raril4.txt
downloader Lumma ps1 ua-wget
US USDaveLikesMalwre2024.10.12
View only the last 5
Beta Service, If you select keyword, you can check detailed information.