Summary: 2025/04/24 18:44
First reported date: 2017/11/08
Inquiry period : 2025/03/25 18:44 ~ 2025/04/24 18:44 (1 months), 2 search results
전 기간대비 -50% 낮은 트렌드를 보이고 있습니다.
악성코드 유형 Konni 도 새롭게 확인됩니다.
공격기술 Campaign Phishing 캠페인 도 새롭게 확인됩니다.
기관 및 기업 Genian Police North Korea 경찰청 dprk 도 새롭게 확인됩니다.
기타 uncommon 사칭 국가인권위 cti lnk 등 신규 키워드도 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Konni |
|
1 (100%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Genian |
|
1 (20%) |
Police |
|
1 (20%) |
North Korea |
|
1 (20%) |
경찰청 |
|
1 (20%) |
dprk |
|
1 (20%) |
Threat info
Last 5SNS
(Total : 2)
Total keyword
Campaign Genian Phishing Police North Korea 캠페인 Konni 경찰청 dprk attack
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities - Malware.News | 2025.04.24 |
2 | 포티넷코리아, 2024 지속가능성 보고서 발표 - 데일리시큐 | 2025.04.24 |
3 | 정보 탈취형 악성코드 이메일 작년 대비 84% 증가 - 데일리시큐 | 2025.04.24 |
4 | DslogdRAT Malware Installed in Ivanti Connect Secure - Malware.News | 2025.04.24 |
5 | Orange Sales Rise Slightly Buoyed by African Unit Growth - Bloomberg Technology | 2025.04.24 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Increase in Distribution of AutoIt Compile Malware via Phishing Emails - Malware.News | 2025.01.10 |
2 | Increase in Distribution of AutoIt Compile Malware via Phishing Emails - ASEC BLOG | 2025.01.09 |
3 | Threat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt Script - Malware.News | 2024.08.22 |
4 | Threat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt Script - Malware.News | 2024.08.22 |
5 | Threat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt Script - Malware.News | 2024.08.22 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() CoinMiner AutoIt Generic Malware UPX PE File PE32 | c2e60013e06179236d27f81811f848df | 53045 | 2024.08.19 |
2 | ![]() CoinMiner AutoIt Generic Malware UPX PE File PE32 | 5fb6829b52847d878a98f9069e5c5fa4 | 53041 | 2024.08.19 |
3 | ![]() CoinMiner AutoIt Generic Malware UPX PE File PE32 | 754c738f12caa66eae85d417a235908e | 53031 | 2024.08.19 |
4 | ![]() CoinMiner AutoIt Generic Malware UPX PE File PE32 | 46be1d2a2de1c43b0169874d14503098 | 53051 | 2024.08.19 |
5 | ![]() CoinMiner AutoIt Generic Malware UPX PE File PE32 | 2b7bff01c4165d267d31d52c15b2d0ec | 53040 | 2024.08.19 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 53 AntiVirus engines on VirusTotal as malicious |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | The executable uses a known packer |
No data
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | https://arch1.usa1news.buzz/s/mirror/mNuFgfJgBDBr9i7DSdfRjuBx/file.zip autoit LummaStealer | US ![]() | CLOUDFLARENET | aachum | 2025.03.08 |
2 | http://book.rollingvideogames.com/temp/yoda.exe autoit dropped-by-vidar | US ![]() | INMOTI-1 | aachum | 2025.02.23 |
3 | https://github.com/legendary6911331/JJJ/releases/download/JKJKJ/BlogsRobert.exe autoit LummaStealer | US ![]() | MICROSOFT-CORP-MSN-AS-BLOCK | aachum | 2025.02.10 |
4 | https://github.com/legendary6911331/dfsfsdfdsf/releases/download/fdssddssd/DocJets.exe AsyncRAT autoit | US ![]() | MICROSOFT-CORP-MSN-AS-BLOCK | aachum | 2025.02.10 |
5 | http://tiffany-careers.com/cxZuGa.exe autoit exe malware | RU ![]() | OOO FREEnet Group | Joker | 2025.01.02 |
View only the last 5 |
Beta Service, If you select keyword, you can check detailed information.