Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1njRAT 1 - 0 (0%)
2C2 1 - 0 (0%)
3NetWireRC 1 - 0 (0%)
4c&c 1 - 0 (0%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
njRAT
1 (50%)
NetWireRC
1 (50%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


No data.

Country & Company
Country & Company

This is a country or company that is an issue.


No data.

Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Threat info
Last 5

News

(Total : 0)

No data.

Additional information

No Title Date
1Blind Eagle: …And Justice for All - Malware.News2025.03.10
2Blind Eagle: …And Justice for All - Malware.News2025.03.10
3Blind Eagle: …And Justice for All - Malware.News2025.03.10
4Blind Eagle: …And Justice for All - Malware.News2025.03.10
5Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool - Malware.News2025.03.05
View only the last 5
Level Description
watch Creates known Upatre files
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key
No Category URL CC ASN Co Date
1c2http://54.169.93.143:10549/SG SGAMAZON-022025.04.11
2c2http://18.190.63.84:11421/US USAMAZON-022025.04.01
3c2http://3.137.60.53:11421/US USAMAZON-022025.04.01
4c2http://3.12.245.36:11421/US USAMAZON-022025.04.01
5c2http://3.135.250.11:11421/US USAMAZON-022025.04.01
View only the last 5
No URL CC ASN Co Reporter Date
1http://github.com/MommyNikiits/NotTouchingDD/raw/master/Device2.exe
njRAT
US USMICROSOFT-CORP-MSN-AS-BLOCKabus3reports2025.04.13
2https://raw.githubusercontent.com/gamingdued123/UeukFI/main/clientside.exe
github njRAT
US USFASTLYRiordz2025.02.22
3https://github.com/BARHOM1/brobr/raw/main/WindowsServices.exe
github njRAT
US USMICROSOFT-CORP-MSN-AS-BLOCKRiordz2025.02.22
4https://raw.githubusercontent.com/kostyosthesystem/ratnik/refs/heads/main/ratnik.zip
github njRAT
US USFASTLYRiordz2025.02.22
5https://raw.githubusercontent.com/Toxicxz/Fnaf-1/refs/heads/main/fuscagame.exe
github njRAT
US USFASTLYRiordz2025.02.22
View only the last 5
Beta Service, If you select keyword, you can check detailed information.