Summary: 2025/04/28 19:37
First reported date: 2010/05/28
Inquiry period : 2025/03/29 19:37 ~ 2025/04/28 19:37 (1 months), 14 search results
전 기간대비 36% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 keylogger Victim China Windows Update 입니다.
악성코드 유형 TONESHELL PlugX GameoverP2P Lobshot 도 새롭게 확인됩니다.
공격기술 hijack Dropper 도 새롭게 확인됩니다.
기관 및 기업 Zscaler Government Microsoft Recorded Future Türkiye 도 새롭게 확인됩니다.
기타 EDR MUSTANG PANDA Cobalt Strike IoC SplatCloak 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/17 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2
ㆍ 2025/04/17 Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1
ㆍ 2025/04/14 A week in security (April 7 – April 13)
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | keylogger | 14 | ▲ 5 (36%) |
2 | EDR | 4 | ▲ new |
3 | Victim | 4 | ▲ 2 (50%) |
4 | MUSTANG PANDA | 4 | ▲ new |
5 | Zscaler | 4 | ▲ new |
6 | Malware | 4 | ▼ -2 (-50%) |
7 | Cobalt Strike | 4 | ▲ new |
8 | China | 3 | ▲ 2 (67%) |
9 | Windows | 3 | ▲ 2 (67%) |
10 | Update | 3 | ▲ 2 (67%) |
11 | TONESHELL | 3 | ▲ new |
12 | Campaign | 3 | ▲ 1 (33%) |
13 | SnakeKeylogger | 3 | ▲ 2 (67%) |
14 | c&c | 3 | ▲ 2 (67%) |
15 | IoC | 3 | ▲ new |
16 | target | 3 | ▲ 1 (33%) |
17 | Exploit | 2 | ▼ -1 (-50%) |
18 | SplatCloak | 2 | ▲ new |
19 | Government | 2 | ▲ new |
20 | attack | 2 | ▼ -1 (-50%) |
21 | GitHub | 2 | ▲ new |
22 | Advertising | 2 | - 0 (0%) |
23 | Backdoor | 2 | - 0 (0%) |
24 | hijack | 2 | ▲ new |
25 | Trojan | 2 | ▲ 1 (50%) |
26 | Mustang | 2 | ▲ new |
27 | Operation | 2 | ▲ new |
28 | ThreatProtection | 2 | ▼ -1 (-50%) |
29 | Dropper | 2 | ▲ new |
30 | c2 | 2 | ▲ new |
31 | StarProxy | 2 | ▲ new |
32 | Stealer | 2 | ▲ 1 (50%) |
33 | pharmacist | 2 | ▲ new |
34 | Maryland | 2 | ▲ new |
35 | driver | 1 | ▲ new |
36 | errord | 1 | ▲ new |
37 | generated | 1 | ▲ new |
38 | small | 1 | ▲ new |
39 | second | 1 | ▲ new |
40 | part | 1 | ▲ new |
41 | series | 1 | ▲ new |
42 | server | 1 | ▲ new |
43 | Kaspersky | 1 | - 0 (0%) |
44 | Europe | 1 | - 0 (0%) |
45 | Microsoft | 1 | ▲ new |
46 | schtasks | 1 | ▲ new |
47 | file | 1 | ▲ new |
48 | Mustan | 1 | ▲ new |
49 | PlugX | 1 | ▲ new |
50 | UNIX | 1 | ▲ new |
51 | GameoverP2P | 1 | ▲ new |
52 | stealth | 1 | ▲ new |
53 | v3 | 1 | ▲ new |
54 | mailalnozhaqacom | 1 | ▲ new |
55 | MassLogger | 1 | ▲ new |
56 | employment | 1 | ▲ new |
57 | Panda | 1 | ▲ new |
58 | Record | 1 | ▲ new |
59 | personal | 1 | ▲ new |
60 | Man | 1 | ▲ new |
61 | Magic Kitten | 1 | ▲ new |
62 | Recorded Future | 1 | ▲ new |
63 | Future | 1 | ▲ new |
64 | Recorded | 1 | ▲ new |
65 | decade | 1 | ▲ new |
66 | recent | 1 | ▲ new |
67 | NortonLifeLock | 1 | ▼ -1 (-100%) |
68 | infostealer | 1 | ▲ new |
69 | multistage | 1 | - 0 (0%) |
70 | variety | 1 | ▲ new |
71 | notorious | 1 | ▲ new |
72 | iocs | 1 | ▲ new |
73 | maas | 1 | ▲ new |
74 | home | 1 | ▲ new |
75 | Android | 1 | ▲ new |
76 | exploration | 1 | ▲ new |
77 | cybercrime | 1 | - 0 (0%) |
78 | ThreatLabz | 1 | ▲ new |
79 | Türkiye | 1 | ▲ new |
80 | MalSpam | 1 | ▼ -1 (-100%) |
81 | İŞKUR | 1 | ▲ new |
82 | agency | 1 | ▲ new |
83 | Turkeys | 1 | ▲ new |
84 | Last | 1 | ▲ new |
85 | Phishing | 1 | ▼ -2 (-200%) |
86 | April | 1 | ▲ new |
87 | 1 | - 0 (0%) | |
88 | ZeroDay | 1 | ▲ new |
89 | 1 | ▲ new | |
90 | Ransomware | 1 | ▼ -1 (-100%) |
91 | Lobshot | 1 | ▲ new |
92 | Report | 1 | - 0 (0%) |
93 | execution | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
TONESHELL |
|
3 (25%) |
SnakeKeylogger |
|
3 (25%) |
Trojan |
|
2 (16.7%) |
PlugX |
|
1 (8.3%) |
GameoverP2P |
|
1 (8.3%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Zscaler |
|
4 (26.7%) |
China |
|
3 (20%) |
Government |
|
2 (13.3%) |
Kaspersky |
|
1 (6.7%) |
Europe |
|
1 (6.7%) |
Threat info
Last 5SNS
(Total : 9)keylogger SnakeKeylogger Campaign Stealer EDR MUSTANG PANDA Cobalt Strike Zscaler TONESHELL c2 c&c China MalSpam target iocs IoC Türkiye Recorded Future Victim
News
(Total : 5)keylogger Malware Victim Windows Update hijack Trojan Backdoor Advertising GitHub Exploit EDR c&c IoC Zscaler MUSTANG PANDA target attack Operation Government TONESHELL Cobalt Strike China Dropper Magic Kitten ZeroDay UNIX Europe C2 Attacker GameoverP2P Report WhatsApp Ransomware Lobshot Kaspersky Phishing Google Android Microsoft schtasks PlugX
No | Title | Date |
---|---|---|
1 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
2 | Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 - Malware.News | 2025.04.17 |
3 | A week in security (April 7 – April 13) - Malware.News | 2025.04.14 |
4 | Man accused of using keylogger to spy on colleagues, log in to their personal accounts and watch them at home - Malwarebytes Labs | 2025.04.09 |
5 | Maryland pharmacist used keyloggers to spy on coworkers for a decade, victim alleges - The Record / James Reddick / malpedia | 2025.04.05 |
Additional information
No | Title | Date |
---|---|---|
1 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
2 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
3 | Navigating Through The Fog - Malware.News | 2025.04.28 |
4 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
5 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
2 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
3 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
4 | Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 - Malware.News | 2025.04.17 |
5 | A week in security (April 7 – April 13) - Malware.News | 2025.04.14 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() task schedule PWS Code injection KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 DLL .NET DLL | 69f49a50e927c947f4cb26a03dc67285 | 60241 | 2025.04.28 |
2 | ![]() Gen1 Themida Generic Malware PhysicalDrive Downloader UPX Malicious Packer Malicious Library Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P | bfd4ad6d57c086d2e64ccd39398a908e | 60244 | 2025.04.28 |
3 | ![]() ScreenShot KeyLogger AntiDebug AntiVM | 88a97131e57b1a857d13bb0cae48380e | 60256 | 2025.04.28 |
4 | ![]() ScreenShot KeyLogger AntiDebug AntiVM | 490df99cbb5c295e25a0234d86ab1d98 | 60263 | 2025.04.28 |
5 | file.7z Escalate priviledges PWS KeyLogger AntiDebug AntiVM | 7d3d40ab4713e39df7171bd505172cab | 59889 | 2025.04.24 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 50 AntiVirus engines on VirusTotal as malicious |
danger | Executed a process and injected code into it |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Code injection by writing an executable or DLL to the memory of another process |
watch | Communicates with host for which no DNS query was performed |
watch | Deletes executed files from disk |
watch | Manipulates memory of a non-child process indicative of process injection |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates executable files on the filesystem |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries |
notice | Executes one or more WMI queries which can be used to identify virtual machines |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | One or more processes crashed |
info | Queries for the computername |
info | Uses Windows APIs to generate a cryptographic key |
Network | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
Network | ET INFO Executable Download from dotted-quad Host |
Network | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
Network | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
Network | ET POLICY PE EXE or DLL Windows file download HTTP |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | https://tinyfilemanagerdemo.alwaysdata.net/user/files/b.exe alwaysdata exe keylogger | FR ![]() | Alwaysdata Sarl | user1222 | 2025.02.23 |
2 | http://141.147.43.219:3000/ftp/EmmetPROD.exe exe keylogger lazy | SE ![]() | Riordz | 2025.01.31 | |
3 | http://107.172.148.212/260/cvss.exe exe keylogger snake | US ![]() | AS-COLOCROSSING | Riordz | 2025.01.30 |
4 | http://caca.vercel.app/file.exe keylogger | US ![]() | abus3reports | 2024.12.06 | |
5 | https://raw.githubusercontent.com/cheetz/nishang/master/Gather/Keylogger.ps1 keylogger | US ![]() | FASTLY | abus3reports | 2024.12.06 |
View only the last 5 |