Summary: 2025/05/04 11:59

First reported date: 2016/12/01
Inquiry period : 2025/04/04 11:59 ~ 2025/05/04 11:59 (1 months), 6 search results

전 기간대비 67% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Gen AI 입니다.
악성코드 유형 GameoverP2P 도 새롭게 확인됩니다.
공격기술 RCE 도 새롭게 확인됩니다.
기관 및 기업 CrowdStrike Trend Micro United States 도 새롭게 확인됩니다.
기타 LLM team OWASP Top KI 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/27 Gen Z und KI: Warum 44 Prozent glauben, dass die Roboter bald regieren
    ㆍ 2025/04/15 Top 10 for LLM & Gen AI Project Ranked by OWASP
    ㆍ 2025/04/10 Technical Program Value Chain Transformation using GenAI E2E Automated solution

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Gen 6 ▲ 4 (67%)
2AI 3 ▲ 2 (67%)
3CrowdStrike 2 ▲ new
4NSA 1 - 0 (0%)
5LLM 1 ▲ new
6team 1 ▲ new
7Trend Micro 1 ▲ new
8OWASP 1 ▲ new
9Top 1 ▲ new
10KI 1 ▲ new
11ChatGPT 1 ▲ new
12AIpowered 1 ▲ new
13dass 1 ▲ new
14Prozent 1 ▲ new
15glauben 1 ▲ new
16Winning 1 ▲ new
17Combination 1 ▲ new
18critical 1 ▲ new
19threat 1 ▲ new
20Technical 1 ▲ new
21Imagine 1 ▲ new
22GameoverP2P 1 ▲ new
23Haugh 1 ▲ new
24Timothy 1 ▲ new
25leadership 1 ▲ new
26Malware 1 - 0 (0%)
27Report 1 - 0 (0%)
28United States 1 ▲ new
29Update 1 ▲ new
30Trump 1 ▲ new
31Advertising 1 ▲ new
32Takedown 1 ▲ new
33Email 1 - 0 (0%)
34RCE 1 ▲ new
35Operation 1 ▲ new
36GenAI 1 ▲ new
37Program 1 ▲ new
38attack 1 - 0 (0%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
GameoverP2P
1 (100%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
RCE
1 (100%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
CrowdStrike
2 (40%)
NSA
1 (20%)
Trend Micro
1 (20%)
United States
1 (20%)

Additional information

No Request Hash(md5) Report No Date
1 askinstall31.exe
Gen
9d1b497b9d05f015cc768ee06fe6050d100452021.04.01
2 askinstall32.exe
Gen
5daa2140732ce865b202962807d107b1100462021.04.01
3asse9e3x.rar
Gen
3d0fffa0fe157c3bffb917e6a8d9da2e100622021.04.01
4 iexplore.exe
Gen
c50eeb216ab9f7e9b375270426c4dfd699452021.03.30
5 r10.dll
Emotet Gen
f3da2faeed91df74170149fc4420ef0998022021.03.27
View only the last 5
Level Description
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Drops 100 unknown file mime types indicative of ransomware writing encrypted files back to disk
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Resolves a suspicious Top Level Domain (TLD)
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice Terminates another process
notice Uses Windows utilities for basic Windows functionality
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Tries to locate where the browsers are installed
No data
No data
Beta Service, If you select keyword, you can check detailed information.