Summary: 2025/04/17 10:36

First reported date: 2013/09/11
Inquiry period : 2025/04/16 10:35 ~ 2025/04/17 10:35 (1 days), 2 search results

지난 7일 기간대비 100% 높은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는
Kimsuky North Korea APT cti dprk 입니다.
악성코드 유형 Konni 도 새롭게 확인됩니다.
공격자 Lazarus 도 새롭게 확인됩니다.
공격기술 Campaign 도 새롭게 확인됩니다.
기관 및 기업 북한 AhnLab SECUI 도 새롭게 확인됩니다.
기타 인터뷰 수해 김수 Malware Report 등 신규 키워드도 확인됩니다.

This threat actor targets South Korean think tanks, industry, nuclear power operators, and the Ministry of Unification for espionage purposes.  Ref.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 북한 김수키(Kimsuky)에서 만든악성코드-KxS 북한 수해 인터뷰 요청서(대문?아카데미 이?열 이사장님).lnk(2025.4.5)

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Kimsuky 2 ▲ 2 (100%)
2North Korea 2 ▲ 2 (100%)
3Campaign 1 ▲ new
4인터뷰 1 ▲ new
5수해 1 ▲ new
6김수 1 ▲ new
7북한 1 ▲ new
8Malware 1 ▲ new
9AhnLab 1 ▲ new
10SECUI 1 ▲ new
11Report 1 ▲ new
12Konni 1 ▲ new
13AhnLabSecuInfo 1 ▲ new
14APT 1 ▲ 1 (100%)
15보고서 1 ▲ new
16동향 1 ▲ new
17그룹 1 ▲ new
18cti 1 ▲ 1 (100%)
19dprk 1 ▲ 1 (100%)
20trend 1 ▲ new
21Lazarus 1 ▲ new
22요청서 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Konni
1 (100%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Kimsuky
2 (66.7%)
Lazarus
1 (33.3%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
1 (50%)
APT
1 (50%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
North Korea
2 (33.3%)
북한
1 (16.7%)
AhnLab
1 (16.7%)
SECUI
1 (16.7%)
dprk
1 (16.7%)

Additional information

Level Description
danger A potential heapspray has been detected. 767 megabytes was sprayed onto the heap of the AcroRd32.exe process
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Performs some HTTP requests
notice The PDF file contains an attachment
notice The PDF file contains JavaScript code
notice Uses Windows utilities for basic Windows functionality
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No Category URL CC ASN Co Date
1malicioushttp://teishin.org/treasury/wp_asist.phpUS USEGIHOSTING2023.09.20
2malicioushttp://teishin.org/treasury/resources/admin/wp-admin/attack.phpUS USEGIHOSTING2023.09.20
3c2http://00701111.000webhostapp.com/wp-extra/show.phpUS US...2023.09.18
No URL CC ASN Co Reporter Date
1https://jpkinki.com/fjugm
APT Kimsuky
US USCLOUDFLARENETIdaNotPro2025.03.26
2https://www.dropbox.com/scl/fi/cnfhxf0nc3qxfklznh5na/zzJG_2.zip?rlkey=7t1et81enar4uvbb7nnk58m9b&st=2...
APT Kimsuky zip
US USDROPBOXabuse_ch2025.02.12
3https://www.dropbox.com/scl/fi/icvpzbx4vn6lcthva168z/zzJG.zip?rlkey=kntc36792grkm64xriqputbdq&st=px5...
APT Kimsuky
US USDROPBOXJAMESWT_MHT2025.02.05
4https://dl.dropboxusercontent.com/scl/fi/3br2y8fin0jqgrunrq3mf/cjfansgmlans1-f.txt?rlkey=rxnknu51ncb...
Kimsuky
US USDROPBOXJAMESWT_MHT2025.01.29
5https://dl.dropboxusercontent.com/scl/fi/nanwt6elsuxziz05hnlt4/cjfansgmlans1-x.txt?rlkey=l6gzro1rswk...
Kimsuky
US USDROPBOXJAMESWT_MHT2025.01.29
View only the last 5
Beta Service, If you select keyword, you can check detailed information.