Summary: 2025/04/29 03:02
First reported date: 2019/11/21
Inquiry period : 2025/03/30 03:02 ~ 2025/04/29 03:02 (1 months), 5 search results
전 기간대비 40% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 SectopRAT Report Malware Campaign NetWireRC 입니다.
악성코드 유형 RATel Ransomware BlackSuit XMRig Rhysida IDATLoader 도 새롭게 확인됩니다.
공격자 UNC5221 도 새롭게 확인됩니다.
공격기술 hacking ClickFix Phishing 도 새롭게 확인됩니다.
기관 및 기업 Apple Check Point Cisco China Germany India Binance 도 새롭게 확인됩니다.
기타 fake Cobalt Strike ZeroDay PDFCandy converter 등 신규 키워드도 확인됩니다.
SectopRAT, aka ArechClient2, is a .NET RAT with numerous capabilities including multiple stealth functions. Arechclient2 can profile victim systems, steal information such as browser and crypto-wallet data, and launch a hidden secondary desktop to control browser sessions. Additionally, it has several anti-VM and anti-emulator capabilities. Ref.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/16 Infostealer deployed via bogus PDFCandy converter
ㆍ 2025/04/07 7th April – Threat Intelligence Report
참고로 동일한 그룹의 악성코드 타입은 Remcos njRAT QuasarRAT 등 112개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | SectopRAT | 5 | ▲ 2 (40%) |
2 | Report | 3 | ▲ 1 (33%) |
3 | Malware | 3 | ▲ 1 (33%) |
4 | RATel | 2 | ▲ new |
5 | Campaign | 2 | ▲ 1 (50%) |
6 | fake | 2 | ▲ new |
7 | Ransomware | 2 | ▲ new |
8 | BlackSuit | 2 | ▲ new |
9 | NetWireRC | 2 | ▲ 1 (50%) |
10 | Cobalt Strike | 2 | ▲ new |
11 | Stealer | 1 | - 0 (0%) |
12 | UNC5221 | 1 | ▲ new |
13 | amp | 1 | - 0 (0%) |
14 | ZeroDay | 1 | ▲ new |
15 | Update | 1 | - 0 (0%) |
16 | Apple | 1 | ▲ new |
17 | hacking | 1 | ▲ new |
18 | XMRig | 1 | ▲ new |
19 | PDFCandy | 1 | ▲ new |
20 | converter | 1 | ▲ new |
21 | MWNEWS | 1 | ▲ new |
22 | Infostealer | 1 | ▲ new |
23 | bogus | 1 | ▲ new |
24 | Rhysida | 1 | ▲ new |
25 | Microsoft | 1 | - 0 (0%) |
26 | Alert | 1 | ▲ new |
27 | NodejsPowered | 1 | ▲ new |
28 | powershell | 1 | - 0 (0%) |
29 | ClickFix | 1 | ▲ new |
30 | Phishing | 1 | ▲ new |
31 | Check Point | 1 | ▲ new |
32 | Cisco | 1 | ▲ new |
33 | C2 | 1 | ▲ new |
34 | Zoom | 1 | ▲ new |
35 | Cobalt | 1 | ▲ new |
36 | IDATLoader | 1 | ▲ new |
37 | arechclient2 | 1 | ▲ new |
38 | Low | 1 | ▲ new |
39 | ArechClient | 1 | ▼ -1 (-100%) |
40 | abusech | 1 | ▲ new |
41 | httpstcoOIQANnaWNl | 1 | ▲ new |
42 | c&c | 1 | - 0 (0%) |
43 | DarkWeb | 1 | ▲ new |
44 | Vulnerability | 1 | ▲ new |
45 | CVSS | 1 | ▲ new |
46 | Android | 1 | ▲ new |
47 | United States | 1 | - 0 (0%) |
48 | Victim | 1 | - 0 (0%) |
49 | DFIR | 1 | ▲ new |
50 | China | 1 | ▲ new |
51 | Germany | 1 | ▲ new |
52 | India | 1 | ▲ new |
53 | Binance | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
SectopRAT |
|
5 (29.4%) |
RATel |
|
2 (11.8%) |
Ransomware |
|
2 (11.8%) |
BlackSuit |
|
2 (11.8%) |
NetWireRC |
|
2 (11.8%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
UNC5221 |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Apple |
|
1 (11.1%) |
Microsoft |
|
1 (11.1%) |
Check Point |
|
1 (11.1%) |
Cisco |
|
1 (11.1%) |
United States |
|
1 (11.1%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 3)SectopRAT Phishing ClickFix Campaign powershell NetWireRC Microsoft Malware c&c C2 ArechClient Cobalt Strike RATel IDATLoader BlackSuit Ransomware Cobalt Report Binance
News
(Total : 2)SectopRAT Malware Report ZeroDay Check Point XMRig hacking Apple Update Stealer UNC5221 RATel Rhysida Cobalt Strike Cisco NetWireRC DarkWeb Ransomware BlackSuit India Germany China Attacker Victim United States Campaign Android CVSS Vulnerability
No | Title | Date |
---|---|---|
1 | Infostealer deployed via bogus PDFCandy converter - Malware.News | 2025.04.16 |
2 | 7th April – Threat Intelligence Report - Malware.News | 2025.04.07 |
Additional information
No | Title | Date |
---|---|---|
1 | FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023 - Malware.News | 2025.04.29 |
2 | US intensifies Salt Typhoon crackdown with public info request - Malware.News | 2025.04.29 |
3 | Trump moves threaten US cyber defenses, says former CISA director Easterly - Malware.News | 2025.04.29 |
4 | Escalating attacks against Ivanti VPN appliances expected - Malware.News | 2025.04.29 |
5 | Critical Planet Technology switch vulnerabilities pose total takeover risk - Malware.News | 2025.04.29 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | 7th April – Threat Intelligence Report - Malware.News | 2025.04.07 |
2 | 7th April – Threat Intelligence Report - Malware.News | 2025.04.07 |
3 | 7th April – Threat Intelligence Report - Malware.News | 2025.04.07 |
4 | ArechClient; Decoding IOCs and finding the onboard browser extension - Malware.News | 2025.03.13 |
5 | ArechClient; Decoding IOCs and finding the onboard browser extension - Malware.News | 2025.03.13 |
View only the last 5 |
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | c2 | http://92.255.85.23:9000/wbinjget | RU ![]() | Comfortel Ltd. | 2025.04.10 |
2 | c2 | http://92.255.85.23:15847/ | RU ![]() | Comfortel Ltd. | 2025.04.10 |
3 | c2 | http://91.92.255.187:1334/ | BG ![]() | 2024.01.14 | |
4 | c2 | http://94.130.51.115:15648/ | DE ![]() | Hetzner Online GmbH | 2023.12.11 |
5 | c2 | http://138.201.120.172:15648/ | DE ![]() | Hetzner Online GmbH | 2023.11.14 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://87.120.127.223/panel/uploads/Afocvkc.dat RedLine SectopRAT | BG ![]() | Yuri Jordanov Ltd. | Moneroon | 2024.10.17 |
2 | https://185.172.128.142/fj26s4kt9642y4o/2065428919.png Arechclient2 SectopRAT | RU ![]() | OOO Nadym Svyaz Service | abuse_ch | 2024.05.22 |
3 | http://88.150.180.26/temp_project/docs/old/227.exe dropped-by-PrivateLoader SectopRAT | GB ![]() | Iomart Cloud Services Limited | andretavare5 | 2023.11.22 |
4 | http://h171713.srv22.test-hf.su/227.exe dropped-by-PrivateLoader SectopRAT | RU ![]() | LLC Eximius | andretavare5 | 2023.11.21 |
5 | https://alexsazo.com/2.tar.gpg SectopRAT | RU ![]() | Ao a.b.n. | JAMESWT_MHT | 2023.09.20 |
View only the last 5 |