Summary: 2025/04/17 16:03

First reported date: 2014/10/30
Inquiry period : 2025/03/18 16:03 ~ 2025/04/17 16:03 (1 months), 2 search results

전 기간대비 동일한 트렌드를 보이고 있습니다.
악성코드 유형
Konni RAT 도 새롭게 확인됩니다.
기관 및 기업 dprk North Korea 도 새롭게 확인됩니다.
기타 lnk cti Analysis Stealth cve202427564 등 신규 키워드도 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Persistence 2 - 0 (0%)
2Konni 1 ▲ new
3lnk 1 ▲ new
4dprk 1 ▲ new
5cti 1 ▲ new
6Analysis 1 ▲ new
7RAT 1 ▲ new
8Stealth 1 ▲ new
9North Korea 1 ▲ new
10cve202427564 1 ▲ new
11SSRF 1 ▲ new
12Weve 1 ▲ new
13CVE 1 ▲ new
14vulnerable 1 ▲ new
15ChatGPT 1 ▲ new
16Education 1 - 0 (0%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Konni
1 (50%)
RAT
1 (50%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


No data.

Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
dprk
1 (50%)
North Korea
1 (50%)

Additional information

Level Description
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Potentially malicious URLs were found in the process memory dump
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No data
Beta Service, If you select keyword, you can check detailed information.