Trend graph by period
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Dropper |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 3)
Total keyword
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | The 4 P’s of Customer Engagement - CIO Security | 2022.03.23 |
Level | Description |
---|---|
warning | File has been identified by 27 AntiVirus engines on VirusTotal as malicious |
watch | Creates a suspicious Powershell process |
watch | Network communications indicative of a potential document or script payload download was initiated by the process powershell.exe |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | The process powershell.exe wrote an executable file to disk |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | Poweshell is sending data to a remote host |
notice | URL downloaded by powershell script |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | Queries for the computername |
info | Uses Windows APIs to generate a cryptographic key |
Network | ET POLICY [401TRG] DropBox Access via API (SNI) |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |
No data
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | https://pastebin.com/raw/uh1GCpxx ascii powershell ps | US ![]() | abuse_ch | 2025.02.07 | |
2 | http://87.120.120.56/crypt/laser.ps1 ps Ranpack | BG ![]() | Yuri Jordanov Ltd. | SanchoZZ | 2025.02.04 |
3 | https://0x0.st/8-5S.ps1 ascii MassLogger powershell ps | DE ![]() | abuse_ch | 2025.01.22 | |
4 | https://paste.ee/d/IWZXK/0 ps | US ![]() | abus3reports | 2024.12.06 | |
5 | https://paste.ee/d/GDlGg/0 ps | US ![]() | CLOUDFLARENET | abus3reports | 2024.12.06 |
View only the last 5 |
Beta Service, If you select keyword, you can check detailed information.