Summary: 2025/04/30 14:53

First reported date: 2013/03/05
Inquiry period : 2025/04/29 14:53 ~ 2025/04/30 14:53 (1 days), 2 search results

지난 7일 기간대비 50% 높은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는
powershell Windows Criminal Stealer Update 입니다.
악성코드 유형 AsyncRAT Stealc 도 새롭게 확인됩니다.
공격자 Anonymous 도 새롭게 확인됩니다.
기관 및 기업 Recorded Future Palo Alto Networks 도 새롭게 확인됩니다.
기타 Browser M ProtectionHighlight cybercrime WMI 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/29 Uncovering MintsLoader With Recorded Future Malware Intelligence Hunting

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1powershell 2 ▲ 1 (50%)
2Windows 2 ▲ 1 (50%)
3AsyncRAT 1 ▲ new
4Browser 1 ▲ new
5Criminal 1 ▲ 1 (100%)
6Stealer 1 ▲ 1 (100%)
7Update 1 ▲ 1 (100%)
8Java 1 ▲ 1 (100%)
9Advertising 1 ▲ 1 (100%)
10Recorded Future 1 ▲ new
11M 1 ▲ new
12ThreatProtection 1 ▲ 1 (100%)
13ProtectionHighlight 1 ▲ new
14cybercrime 1 ▲ new
15threat 1 ▲ 1 (100%)
16ZeroDay 1 ▲ 1 (100%)
17NortonLifeLock 1 ▲ 1 (100%)
18Anonymous 1 ▲ new
19Stealc 1 ▲ new
20NetWireRC 1 ▲ 1 (100%)
21Campaign 1 - 0 (0%)
22Palo Alto Networks 1 ▲ new
23Malware 1 - 0 (0%)
24Kaspersky 1 ▲ 1 (100%)
25Phishing 1 - 0 (0%)
26Report 1 ▲ 1 (100%)
27Russia 1 ▲ 1 (100%)
28United States 1 ▲ 1 (100%)
29Italy 1 ▲ 1 (100%)
30IoC 1 ▲ 1 (100%)
31c&c 1 - 0 (0%)
32Victim 1 ▲ 1 (100%)
33Distribution 1 ▲ 1 (100%)
34WMI 1 ▲ new
35Linux 1 ▲ 1 (100%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
AsyncRAT
1 (33.3%)
Stealc
1 (33.3%)
NetWireRC
1 (33.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Anonymous
1 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Stealer
1 (33.3%)
Campaign
1 (33.3%)
Phishing
1 (33.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Recorded Future
1 (16.7%)
Palo Alto Networks
1 (16.7%)
Kaspersky
1 (16.7%)
Russia
1 (16.7%)
United States
1 (16.7%)

Additional information

Level Description
danger The process powershell.exe wrote an executable file to disk which it then attempted to execute
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
watch Attempts to create or modify system certificates
watch Creates a suspicious Powershell process
watch Disables proxy possibly for traffic interception
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key
Network ET INFO File Sharing Related Domain in DNS Lookup (4sync .com)
Network ET INFO Observed File Sharing Related Domain (4sync .com) in TLS SNI
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No URL CC ASN Co Reporter Date
1https://paste.ee/d/foOP0g8Z/0
ascii powershell ps1
abuse_ch2025.04.25
2http://176.65.134.8/metacodings.txt
ascii AsyncRAT powershell ps1 rat
DE DEDiogelo Ltd.abuse_ch2025.04.25
3https://paste.ee/d/L8tHN98p/0
ascii powershell ps1 xworm
abuse_ch2025.04.25
4https://www.wilkinsonbeane.com/css/slider/asclepiadaceaebOet.php
ascii opendir powershell ps1
US USUNIFIEDLAYER-AS-1abuse_ch2025.04.25
5https://www.wilkinsonbeane.com/css/slider/sciurineslwWf.php
ascii opendir powershell ps1
US USUNIFIEDLAYER-AS-1abuse_ch2025.04.25
View only the last 5
Beta Service, If you select keyword, you can check detailed information.