Trend graph by period
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 3)
Total keyword
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
2 | Threat Hunting: For what, when, and how? - Malware.News | 2025.04.26 |
3 | Detection Engineering Fundamentals: What makes a good alert? - Malware.News | 2025.04.26 |
4 | What is the xBOM? - Malware.News | 2025.04.26 |
5 | To Catch A Thief | Rubrik - CyberScoop | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Why you should remove SSL Pinning from Your Mobile Apps in 2025 - Malware.News | 2025.03.10 |
2 | Why you should remove SSL Pinning from Your Mobile Apps in 2025 - Malware.News | 2025.03.10 |
3 | 스틸리언, 사이버 보안 인재 멘토링 프로그램(SSL) 5기 모집 - 데일리시큐 | 2024.09.02 |
4 | 스틸리언, 사이버 보안 인재 멘토링 프로그램(SSL) 5기 모집 - 데일리시큐 | 2024.09.02 |
5 | Sonicwall Patch Authentication Bypass Flaw in SonicOS SSL VPN - Cyberkendra | 2024.02.09 |
View only the last 5 |
Level | Description |
---|---|
danger | Executed a process and injected code into it |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Checks the CPU name from registry |
watch | Checks the version of Bios |
watch | Detects the presence of Wine emulator |
watch | One or more of the buffers contains an embedded PE file |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | A process attempted to delay the analysis task. |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks whether any human activity is being performed by constantly checking whether the foreground window changed |
notice | Foreign language identified in PE resource |
notice | One or more potentially interesting buffers were extracted |
notice | Potentially malicious URLs were found in the process memory dump |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable uses a known packer |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | Tries to locate where the browsers are installed |
No data
No data
Beta Service, If you select keyword, you can check detailed information.