Summary: 2025/04/17 12:59

First reported date: 2016/08/25
Inquiry period : 2025/04/16 12:59 ~ 2025/04/17 12:59 (1 days), 1 search results

지난 7일 기간대비 100% 높은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는
AgentTesla 입니다.
공격기술 MalSpam Campaign 도 새롭게 확인됩니다.
기타 ThreatProtection deliver multistage 신규 키워드도 확인됩니다.

A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.  Ref.

참고로 동일한 그룹의 악성코드 타입은 FormBook QakBot RedLine 등 101개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1ThreatProtection 1 ▲ new
2MalSpam 1 ▲ new
3AgentTesla 1 ▲ 1 (100%)
4deliver 1 ▲ new
5multistage 1 ▲ new
6Campaign 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
AgentTesla
1 (100%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
MalSpam
1 (50%)
Campaign
1 (50%)
Country & Company
Country & Company

This is a country or company that is an issue.


No data.

Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Additional information

No Title Date
1What Is The New Steganographic Campaign Distributing Multiple Malware - Malware.News2025.03.17
2Campagna AgentTesla ritorna in azione dopo un attacco fallito: aggiornato loader e nuove tecniche di cifratura - Malware.News2024.12.02
3ESRC 주간 Email 위협 통계 (6월 첫째주) - 이스트시큐리티 알약 블로그...2024.06.04
4ESRC 주간 Email 위협 통계 (6월 첫째주) - 이스트시큐리티 알약 블로그...2024.06.04
5ESRC 주간 Email 위협 통계 (6월 첫째주) - 이스트시큐리티 알약 블로그...2024.06.04
View only the last 5
Level Description
danger The process wscript.exe wrote an executable file to disk which it then attempted to execute
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious
watch A process attempted to delay the analysis task.
watch Creates a windows hook that monitors keyboard input (keylogger)
watch Drops a binary and executes it
watch Harvests credentials from local email clients
watch Looks for the Windows Idle Time to determine the uptime
watch Makes SMTP requests
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Connects to smtp.gmail.com
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
Network SURICATA Applayer Detect protocol only one direction
No Category URL CC ASN Co Date
1c2http://mail.chinaplasticsac.com/US USRadware Ltd2025.03.18
2c2http://ftp.concaribe.com/US USUNIFIEDLAYER-AS-12025.03.17
3c2http://ftp.antoniomayol.com/US USUNIFIEDLAYER-AS-12024.09.19
4c2http://ftp.jeepcommerce.rs/RS RSBeotelNet-ISP d.o.o2024.09.19
5c2http://smtp.coxenregy.com/US USPUBLIC-DOMAIN-REGISTRY2024.08.08
View only the last 5
No URL CC ASN Co Reporter Date
1https://paste.ee/d/wgmq7eQD/0
AgentTesla ascii Encoded
abuse_ch2025.04.15
2https://paste.ee/d/gkS5S6ML
AgentTesla ascii powershell
abuse_ch2025.04.15
3https://www.klapalevanda.com/sd/cdbMMDaCnqc244.bin
AgentTesla encrypted GuLoader
HR HRSedmi Odjel d.o.o.abuse_ch2025.04.15
4https://www.klapalevanda.com/sd/Perosomus.pfb
AgentTesla ascii Encoded GuLoader
HR HRSedmi Odjel d.o.o.abuse_ch2025.04.15
5http://176.65.142.190/host/NEWFILEEE.ps1
AgentTesla
DE DEJAMESWT_WT2025.04.11
View only the last 5
Beta Service, If you select keyword, you can check detailed information.