Summary: 2025/04/30 07:38
First reported date: 2014/04/06
Inquiry period : 2025/03/31 07:38 ~ 2025/04/30 07:38 (1 months), 5 search results
전 기간대비 20% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 script Advertising 입니다.
악성코드 유형 Clipbanker Trojan 도 새롭게 확인됩니다.
공격기술 Exploit Phishing hijack Hijacking RCE 도 새롭게 확인됩니다.
기관 및 기업 Kaspersky Russia Microsoft 도 새롭게 확인됩니다.
기타 exe Browser Takedown Software Password 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/08 Attackers distributing a miner and the ClipBanker Trojan via SourceForge
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | script | 5 | ▲ 1 (20%) |
2 | Advertising | 2 | ▲ 1 (50%) |
3 | exe | 1 | ▲ new |
4 | Exploit | 1 | ▲ new |
5 | Browser | 1 | ▲ new |
6 | Clipbanker | 1 | ▲ new |
7 | Takedown | 1 | ▲ new |
8 | Trojan | 1 | ▲ new |
9 | Software | 1 | ▲ new |
10 | attack | 1 | - 0 (0%) |
11 | Password | 1 | ▲ new |
12 | file | 1 | ▲ new |
13 | archive | 1 | ▲ new |
14 | py | 1 | - 0 (0%) |
15 | batch | 1 | ▲ new |
16 | Update | 1 | - 0 (0%) |
17 | French | 1 | ▲ new |
18 | Alleged | 1 | ▲ new |
19 | Phishing | 1 | ▲ new |
20 | target | 1 | ▲ new |
21 | payment | 1 | - 0 (0%) |
22 | datatheft | 1 | ▲ new |
23 | recent | 1 | ▲ new |
24 | analysis | 1 | ▲ new |
25 | JavaScript | 1 | ▲ new |
26 | Java | 1 | - 0 (0%) |
27 | PayFiP | 1 | ▲ new |
28 | Windows | 1 | ▲ new |
29 | GitHub | 1 | - 0 (0%) |
30 | Malware | 1 | ▼ -2 (-200%) |
31 | httpsnopastenetLOAMBWe | 1 | ▲ new |
32 | KongTuke | 1 | ▲ new |
33 | captcha | 1 | ▲ new |
34 | clipboardhijacking | 1 | ▲ new |
35 | pastejacking | 1 | ▲ new |
36 | Friday | 1 | ▲ new |
37 | Injected | 1 | ▲ new |
38 | legitimate | 1 | ▲ new |
39 | hijack | 1 | ▲ new |
40 | Hijacking | 1 | ▲ new |
41 | Kaspersky | 1 | ▲ new |
42 | Telegram | 1 | ▲ new |
43 | Russia | 1 | ▲ new |
44 | Campaign | 1 | - 0 (0%) |
45 | c&c | 1 | ▲ new |
46 | Cryptocurrency | 1 | ▲ new |
47 | Victim | 1 | ▲ new |
48 | powershell | 1 | - 0 (0%) |
49 | Distribution | 1 | - 0 (0%) |
50 | SMB | 1 | ▲ new |
51 | Microsoft | 1 | ▲ new |
52 | RCE | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Clipbanker |
|
1 (50%) |
Trojan |
|
1 (50%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|
Threat info
Last 5SNS
(Total : 4)Java payment target Phishing Advertising Hijacking hijack RCE
News
(Total : 1)Malware Exploit Password attack Software Trojan Takedown Advertising Clipbanker Browser Update Kaspersky GitHub Windows Telegram Microsoft SMB Distribution powershell Attacker Victim Cryptocurrency c&c Campaign Russia
No | Title | Date |
---|---|---|
1 | Attackers distributing a miner and the ClipBanker Trojan via SourceForge - Malware.News | 2025.04.08 |
Additional information
No | Title | Date |
---|---|---|
1 | RSAC 2025 executive interview: Cobalt's Gunter Ollman - Malware.News | 2025.04.30 |
2 | White House Calls Out Amazon, SoFi CEO on Earnings | Bloomberg Technology - Bloomberg Technology | 2025.04.30 |
3 | Averted DDoS attacks peak last year, could be surpassed by year-end - Malware.News | 2025.04.30 |
4 | Zero-day intrusion purportedly thwarts BreachForums comeback - Malware.News | 2025.04.30 |
5 | WooCommerce users subjected to widespread fake security phishing campaign - Malware.News | 2025.04.30 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Attackers distributing a miner and the ClipBanker Trojan via SourceForge - Malware.News | 2025.04.08 |
2 | Attackers distributing a miner and the ClipBanker Trojan via SourceForge - Malware.News | 2025.04.08 |
3 | Tracking Emmenhtal - Malware.News | 2025.03.04 |
4 | LCRYX Ransomware: How a VB Ransomware Locks Your System - Malware.News | 2025.02.24 |
5 | LDAPNightmare Spoof Stealer - Malware.News | 2025.02.17 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | atom.xml Hide_EXE PowerShell Script MZ AntiDebug AntiVM MSOffice File | bb3afc961cd9b132922db723407508e7 | 40173 | 2023.03.29 |
2 | atom.xml Hide_EXE PowerShell Script MZ Generic Malware | bb3afc961cd9b132922db723407508e7 | 40180 | 2023.03.29 |
3 | atom.xml Hide_EXE PowerShell Script MZ AntiDebug AntiVM MSOffice File | 0fcb9115095928eaf98f18f0f65accd1 | 40043 | 2023.03.23 |
4 | 73cceb_69fbb28af79141d4b6bec17... Hide_EXE PowerShell Script MZ Generic Malware Anti_VM Antivirus | 54846ba2f55540444b2f62d30ef9cdbc | 39292 | 2023.03.08 |
5 | 73cceb_040c8f8f0c5d41c1b97ed24... Hide_EXE PowerShell Script MZ Generic Malware Anti_VM Antivirus | d890790d347c384831829e9fbf7c37a4 | 37582 | 2023.02.28 |
View only the last 5 |
Level | Description |
---|---|
watch | Communicates with host for which no DNS query was performed |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | File has been identified by 2 AntiVirus engines on VirusTotal as malicious |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | One or more processes crashed |
Network | ET INFO TLS Handshake Failure |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | https://doubt-privacy-hits-turkey.trycloudflare.com/hiddenbins/ohshit.sh script | US ![]() | CLOUDFLARENET | geenensp | 2025.04.24 |
2 | https://biteblob.com/Download/9DDDTpP4777ip5/#ohshit.sh script | US ![]() | UUNET | geenensp | 2025.04.22 |
3 | https://files.catbox.moe/oayhng.sh script | CA ![]() | ASN852 | geenensp | 2025.04.20 |
4 | http://45.83.207.17/moobot/moobot.sh script | GB ![]() | Clouvider Limited | geenensp | 2025.04.19 |
5 | http://176.65.142.122/bins.sh script | DE ![]() | geenensp | 2025.04.18 | |
View only the last 5 |