Summary: 2025/04/28 23:21

First reported date: 2015/01/23
Inquiry period : 2025/03/29 23:21 ~ 2025/04/28 23:21 (1 months), 48 search results

전 기간대비 42% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
njRAT NetWireRC c&c C2 DDNS 입니다.
악성코드 유형 RAT Trojan 도 새롭게 확인됩니다.
기타 account Email photobucksglatplygg payment Password 등 신규 키워드도 확인됩니다.

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information.
Interested attackers can even find tutorials on YouTube.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/28 Decoding njRAT traffic with NetworkMiner
    ㆍ 2025/04/17 “I sent you an email from your email account,” sextortion scam claims
    ㆍ 2025/04/16 “I sent you an email from your email account,” sextortion scam claims


참고로 동일한 그룹의 악성코드 타입은 Remcos njRAT QuasarRAT 등 112개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1njRAT 48 ▲ 20 (42%)
2NetWireRC 48 ▲ 21 (44%)
3c&c 45 ▲ 20 (44%)
4C2 45 ▲ 22 (49%)
5DDNS 2 ▲ 1 (50%)
6account 2 ▲ new
7Email 2 ▲ new
8Victim 2 - 0 (0%)
9photobucksglatplygg 1 ▲ new
10payment 1 ▲ new
11Password 1 ▲ new
12access 1 ▲ new
13address 1 ▲ new
14own 1 ▲ new
15yetcontinentalglatplygg 1 ▲ new
16studentwifiglatplygg 1 ▲ new
17diseaseexpendituresglatplygg 1 ▲ new
18RAT 1 ▲ new
19vpn 1 - 0 (0%)
20introductionsatisfyglatplygg 1 ▲ new
21rayishim 1 ▲ new
22hiesa 1 ▲ new
23panelthrownglatplygg 1 ▲ new
24recommendedcollinsglatplygg 1 ▲ new
25teamevaluatingglatplygg 1 ▲ new
26traffic 1 ▲ new
27Trojan 1 ▲ new
28Malware 1 ▼ -3 (-300%)
29Browser 1 ▲ new
30jajaovhduckdnsorg 1 ▲ new
31animalpremiumglatplygg 1 ▲ new
32fuckfrance 1 ▲ new
33France 1 - 0 (0%)
34hydrat 1 ▲ new
35serveonet 1 ▲ new
36lakeobservationglatplygg 1 ▲ new
37lesbianstereoglatplygg 1 ▲ new
38packamberglatplygg 1 ▲ new
39Cryptocurrency 1 - 0 (0%)
40getmetglatplygg 1 ▲ new
41overallwhomglatplygg 1 ▲ new
42arquivehacksddnsnet 1 ▲ new
43teachingintegrateglatplygg 1 ▲ new
44target 1 - 0 (0%)
45sextortion 1 ▲ new
46scam 1 ▲ new
47Phishing 1 - 0 (0%)
48NetworkMiner 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
njRAT
48 (49%)
NetWireRC
48 (49%)
RAT
1 (1%)
Trojan
1 (1%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Phishing
1 (100%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
France
1 (100%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Additional information

No Title Date
1Blind Eagle: …And Justice for All - Malware.News2025.03.10
2Blind Eagle: …And Justice for All - Malware.News2025.03.10
3Blind Eagle: …And Justice for All - Malware.News2025.03.10
4Blind Eagle: …And Justice for All - Malware.News2025.03.10
5Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool - Malware.News2025.03.05
View only the last 5
Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
watch Creates known Upatre files
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Resolves a suspicious Top Level Domain (TLD)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key
Network ET DNS Query to a *.top domain - Likely Hostile
No Category URL CC ASN Co Date
1c2http://45.83.207.17:6522/GB GBClouvider Limited2025.04.22
2c2http://jvjv2044duck33.duckdns.org/TR TRTurk Telekom2025.04.22
3c2http://45.83.207.17:3158/GB GBClouvider Limited2025.04.21
4c2http://abolhb.com/RU RU2025.04.21
5c2http://54.169.93.143:10549/SG SGAMAZON-022025.04.11
View only the last 5
No URL CC ASN Co Reporter Date
1https://raw.githubusercontent.com/virusstudiov64/rat/main/sdc.exe
njRAT
US USFASTLYDaveLikesMalwre2025.04.28
2http://github.com/sohpierainxz/Fnaf-1/raw/refs/heads/main/fusca%20game.exe
njRAT
US USMICROSOFT-CORP-MSN-AS-BLOCKDaveLikesMalwre2025.04.28
3http://185.215.113.19//inc/OneDrive.exe
njRAT
anonymous2025.04.26
4http://185.215.113.19//inc/Client_protected.exe
njRAT
anonymous2025.04.26
5http://185.215.113.19//inc/PkContent.exe
njRAT
anonymous2025.04.26
View only the last 5
Beta Service, If you select keyword, you can check detailed information.