Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Tor | 2 | - 0 (0%) |
2 | Update | 2 | ▲ 1 (50%) |
3 | lot | 1 | ▲ new |
4 | chatter | 1 | ▲ new |
5 | BreachForums | 1 | ▲ new |
6 | Clearnet | 1 | ▲ new |
7 | Browser | 1 | ▲ new |
8 | httpstcoeKBLwkcgFp | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 2)
Total keyword
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | 러시아 해킹 그룹 '가마레돈', 우크라이나 내 서방 군사 목표 공격 - 시큐리티팩트 | 2025.04.11 |
2 | 러시아 해킹 그룹 '가마레돈', 우크라이나 내 서방 군사 목표 공격 - 시큐리티팩트 | 2025.04.11 |
3 | 러시아 해킹 그룹 '가마레돈', 우크라이나 내 서방 군사 목표 공격 - 시큐리티팩트 | 2025.04.11 |
4 | Top 10 Dark Web Monitoring Tools - Malware.News | 2025.04.04 |
5 | Top 10 Dark Web Monitoring Tools - Malware.News | 2025.04.04 |
View only the last 5 |
Level | Description |
---|---|
danger | Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) |
watch | Communicates with host for which no DNS query was performed |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a suspicious process |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Terminates another process |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable uses a known packer |
Network | ET CNC Feodo Tracker Reported CnC Server group 8 |
Network | ET INFO TLS Handshake Failure |
Network | ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex |
Network | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) |
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | c2 | https://116.12.180.237/ | SG ![]() | SingNet | 2024.06.03 |
2 | c2 | http://192.121.44.26:9001/ | SE ![]() | Bredband2 AB | 2024.06.03 |
3 | c2 | https://199.58.81.140/ | CA ![]() | KOUMBIT | 2024.06.03 |
4 | c2 | https://89.163.164.202/ | DE ![]() | myLoc managed IT AG | 2024.06.03 |
5 | c2 | https://193.23.244.244/ | DE ![]() | Chaos Computer Club e.V. | 2024.06.03 |
View only the last 5 |
No data
Beta Service, If you select keyword, you can check detailed information.