Summary: 2025/04/24 17:43
First reported date: 2023/10/27
Inquiry period : 2025/04/23 17:43 ~ 2025/04/24 17:43 (1 days), 1 search results
지난 7일 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형 Maze RATel Bankshot Volgmer LPEClient 도 새롭게 확인됩니다.
공격자 Lazarus 도 새롭게 확인됩니다.
공격기술 Campaign 도 새롭게 확인됩니다.
기관 및 기업 United Kingdom South Korea Microsoft United States Kaspersky 도 새롭게 확인됩니다.
기타 Malicious Traffic ZeroDay Update Windows UNIX 등 신규 키워드도 확인됩니다.
LPEClient is an HTTP(S) downloader that expects two command line parameters: an encrypted string containing two URLs (a primary and a secondary C&C server), and the path on the victim's file system to store the downloaded payload.
It sends detailed information about the victim's environment, like computer name, type and number of processors, computer manufacturer, product name, major and minor Windows versions, architecture, memory information, installed security software and the version of the ntoskrnl.exe from its version-information resource.
LPEClient uses specific 32-bit values to represent its execution state (0x59863F09 when connecting via the WinHTTP interface, 0xA9348B57 via WinINet), or the nature of HTTP requests to the C&C servers (0xF07D6B34 when sending system information, 0xEF8C0D51 when requesting a DLL payload, 0xCB790A25 when reporting the successful loading of the DLL, 0xD7B20A96 when reporting the state of the the DLL execution). As the final step, malware looks for the export CloseEnv and executes it. Ref.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/24 Operation SyncHole: Lazarus APT goes back to the well
참고로 동일한 그룹의 악성코드 타입은 SmokeLoader GuLoader Zloader 등 47개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Maze | 1 | ▲ new |
2 | Malicious Traffic | 1 | ▲ new |
3 | ZeroDay | 1 | ▲ new |
4 | Update | 1 | ▲ new |
5 | Windows | 1 | ▲ new |
6 | UNIX | 1 | ▲ new |
7 | RATel | 1 | ▲ new |
8 | Bankshot | 1 | ▲ new |
9 | Volgmer | 1 | ▲ new |
10 | LPEClient | 1 | ▲ new |
11 | EDR | 1 | ▲ new |
12 | United Kingdom | 1 | ▲ new |
13 | South Korea | 1 | ▲ new |
14 | Microsoft | 1 | ▲ new |
15 | Vulnerability | 1 | ▲ new |
16 | Victim | 1 | ▲ new |
17 | Cryptocurrency | 1 | ▲ new |
18 | c&c | 1 | ▲ new |
19 | IoC | 1 | ▲ new |
20 | United States | 1 | ▲ new |
21 | Campaign | 1 | ▲ new |
22 | Report | 1 | ▲ new |
23 | RSA Conference | 1 | ▲ new |
24 | Kaspersky | 1 | ▲ new |
25 | Malware | 1 | ▲ new |
26 | Lazarus | 1 | ▲ new |
27 | Ex | 1 | ▲ new |
Special keyword group
Top 5
Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Lazarus |
|
1 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Campaign |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United Kingdom |
|
1 (20%) |
South Korea |
|
1 (20%) |
Microsoft |
|
1 (20%) |
United States |
|
1 (20%) |
Kaspersky |
|
1 (20%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 1)Maze Malicious Traffic ZeroDay Update Windows UNIX RATel Bankshot Volgmer LPEClient EDR United Kingdom South Korea Microsoft Vulnerability Attacker Victim Cryptocurrency c&c IoC United States Campaign Report RSA Conference Kaspersky Malware Lazarus
No | Title | Date |
---|---|---|
1 | Operation SyncHole: Lazarus APT goes back to the well - Malware.News | 2025.04.24 |
Additional information
No | Title | Date |
---|---|---|
1 | 포티넷코리아, 2024 지속가능성 보고서 발표 - 데일리시큐 | 2025.04.24 |
2 | 정보 탈취형 악성코드 이메일 작년 대비 84% 증가 - 데일리시큐 | 2025.04.24 |
3 | DslogdRAT Malware Installed in Ivanti Connect Secure - Malware.News | 2025.04.24 |
4 | Orange Sales Rise Slightly Buoyed by African Unit Growth - Bloomberg Technology | 2025.04.24 |
5 | Operation SyncHole: Lazarus APT goes back to the well - Malware.News | 2025.04.24 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Operation SyncHole: Lazarus APT goes back to the well - Malware.News | 2025.04.24 |
2 | Operation SyncHole: Lazarus APT goes back to the well - Malware.News | 2025.04.24 |
3 | N. Korean Lazarus Group Targets Software Vendor Using Known Flaws - The Hacker News | 2023.10.27 |