Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1PS 3 ▲ new
2abusech 2 ▲ new
3Low 1 ▲ new
4Dropper 1 ▲ new
5coyote 1 ▲ new
6job 1 ▲ new
7priyaa 1 ▲ new
8bcd 1 ▲ new
9uploaded 1 ▲ new
10Anybody 1 ▲ new
11hell 1 ▲ new
12Gabon 1 ▲ new
13Operation 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


No data.

Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Dropper
1 (100%)
Country & Company
Country & Company

This is a country or company that is an issue.


No data.

Additional information

No Title Date
1The 4 P’s of Customer Engagement - CIO Security2022.03.23
Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
watch Creates a suspicious Powershell process
watch Network communications indicative of a potential document or script payload download was initiated by the process powershell.exe
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Poweshell is sending data to a remote host
notice URL downloaded by powershell script
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key
Network ET POLICY [401TRG] DropBox Access via API (SNI)
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No URL CC ASN Co Reporter Date
1https://pastebin.com/raw/uh1GCpxx
ascii powershell ps
US USabuse_ch2025.02.07
2http://87.120.120.56/crypt/laser.ps1
ps Ranpack
BG BGYuri Jordanov Ltd.SanchoZZ2025.02.04
3https://0x0.st/8-5S.ps1
ascii MassLogger powershell ps
DE DEabuse_ch2025.01.22
4https://paste.ee/d/IWZXK/0
ps
US USabus3reports2024.12.06
5https://paste.ee/d/GDlGg/0
ps
US USCLOUDFLARENETabus3reports2024.12.06
View only the last 5
Beta Service, If you select keyword, you can check detailed information.