Summary: 2025/04/29 04:37
First reported date: 2010/06/10
Inquiry period : 2025/03/30 04:37 ~ 2025/04/29 04:37 (1 months), 2 search results
전 기간대비 -50% 낮은 트렌드를 보이고 있습니다.
악성코드 유형 Dtrack 도 새롭게 확인됩니다.
기타 Twitter Musks XAI Deal Unexpected 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/03/31 Musk’s XAI Deal Offers an Unexpected Win for X Investors
Trend graph by period
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Dtrack |
|
1 (100%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 2)
Total keyword
No | Title | Date |
---|---|---|
1 | Amazing Oscilloscope Demo Scores The Win At Revision 2025 - Hackaday | 2025.04.26 |
2 | Musk’s XAI Deal Offers an Unexpected Win for X Investors - Bloomberg Technology | 2025.03.31 |
Additional information
No | Title | Date |
---|---|---|
1 | FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023 - Malware.News | 2025.04.29 |
2 | US intensifies Salt Typhoon crackdown with public info request - Malware.News | 2025.04.29 |
3 | Trump moves threaten US cyber defenses, says former CISA director Easterly - Malware.News | 2025.04.29 |
4 | Escalating attacks against Ivanti VPN appliances expected - Malware.News | 2025.04.29 |
5 | Critical Planet Technology switch vulnerabilities pose total takeover risk - Malware.News | 2025.04.29 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Indonesia’s $1 Billion Win in Apple Negotiations Sets New Precedent - Bloomberg Technolo... | 2025.02.28 |
2 | US Privacy Snags a Win as Judge Limits Warrantless FBI Searches - Security Latest- W... | 2025.01.25 |
3 | US Privacy Snags a Win as Judge Limits Warrantless FBI Searches - Security Latest- W... | 2025.01.25 |
4 | US Pins Africa Nuclear Win on Technology as Ghana Weighs Options - Bloomberg Technolo... | 2024.10.10 |
5 | Microsoft Defender Flags Tor Browser as Win32/Malgent!MTB Malware - HACKREAD | 2023.10.02 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() ftp Client info stealer email stealer Win Trojan agentTesla browser Antivirus Google Chrome User Data AsyncRAT backdoor | 4ac557f524400a9007c6c8e6912e9e1f | 9472 | 2021.03.22 |
2 | tmt.exe ftp Client info stealer email stealer Win Trojan agentTesla browser Google Chrome User Data Download management AsyncRAT backdoor | c7a6d988c938e4f251cdcd967dc97cfc | 9423 | 2021.03.21 |
3 | xckex.exe ftp Client info stealer email stealer Win Trojan agentTesla browser Google Chrome User Data Download management | 8446eb1134ac6b049b65eead1d545b59 | 9446 | 2021.03.21 |
4 | ![]() ftp Client info stealer email stealer Win Trojan agentTesla browser Antivirus Google Chrome User Data AsyncRAT backdoor | 5c2cd6d19381ac5a4a517c2165b29813 | 9470 | 2021.03.21 |
5 | ![]() Azorult .NET framework ftp Client info stealer email stealer Win Trojan agentTesla browser Google Chrome User Data Download management | d4b31689b01301f90ce578d418a74231 | 9413 | 2021.03.19 |
View only the last 5 |
Level | Description |
---|---|
danger | Executed a process and injected code into it |
warning | File has been identified by 22 AntiVirus engines on VirusTotal as malicious |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Attempts to identify installed AV products by installation directory |
watch | Code injection by writing an executable or DLL to the memory of another process |
watch | Detects VirtualBox through the presence of a file |
watch | Detects VMWare through the presence of various files |
watch | Harvests credentials from local email clients |
watch | Harvests credentials from local FTP client softwares |
watch | Harvests information related to installed instant messenger clients |
watch | Installs itself for autorun at Windows startup |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | The process powershell.exe wrote an executable file to disk |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Connects to a Dynamic DNS Domain |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Looks up the external IP address |
notice | Moves the original executable to a new location |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Potentially malicious URLs were found in the process memory dump |
notice | Steals private information from local Internet browsers |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | Uses Windows APIs to generate a cryptographic key |
Network | ET INFO DYNAMIC_DNS Query to *.dyndns. Domain |
Network | ET POLICY DynDNS CheckIp External IP Address Server Response |
Network | ET POLICY External IP Lookup - checkip.dyndns.org |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |
No data
No data
Beta Service, If you select keyword, you can check detailed information.