Summary: 2025/04/29 00:09

First reported date: 2016/08/25
Inquiry period : 2025/04/22 00:09 ~ 2025/04/29 00:09 (7 days), 2 search results

전 기간대비 동일한 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Lumma 입니다.
악성코드 유형 FormBook Stealc Vidar Lobshot BlackSuit Ransomware 도 새롭게 확인됩니다.
공격기술 Social Engineering Phishing 도 새롭게 확인됩니다.
기관 및 기업 CrowdStrike Recorded Future United States Microsoft Germany 도 새롭게 확인됩니다.
기타 IBM EDR Ch neconyd MFA 등 신규 키워드도 확인됩니다.

A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.  Ref.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/23 Private: Stealing the Future: Infostealers Power Cybercrime in 2025


참고로 동일한 그룹의 악성코드 타입은 FormBook QakBot RedLine 등 101개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1FormBook 2 ▲ new
2AgentTesla 2 - 0 (0%)
3Lumma 2 ▲ 1 (50%)
4IBM 1 ▲ new
5AsyncRAT 1 - 0 (0%)
6EDR 1 ▲ new
7CrowdStrike 1 ▲ new
8Recorded Future 1 ▲ new
9Ch 1 ▲ new
10Tofsee 1 - 0 (0%)
11XWorm 1 - 0 (0%)
12neconyd 1 ▲ new
13MFA 1 ▲ new
14snake 1 - 0 (0%)
15Remcos 1 - 0 (0%)
16Amadey 1 - 0 (0%)
17Top 1 - 0 (0%)
18last 1 - 0 (0%)
19NetWireRC 1 - 0 (0%)
20Stealc 1 ▲ new
21DarkWeb 1 ▲ new
22Malware 1 ▲ new
23Cryptocurrency 1 ▲ new
24Social Engineering 1 ▲ new
25Phishing 1 ▲ new
26Report 1 ▲ new
27QRadar Security Suite 1 ▲ new
28Campaign 1 - 0 (0%)
29United States 1 ▲ new
30Victim 1 ▲ new
31Vidar 1 ▲ new
32Lobshot 1 ▲ new
33Microsoft 1 ▲ new
34Germany 1 ▲ new
35BlackSuit 1 ▲ new
36Ransomware 1 ▲ new
37Advertising 1 - 0 (0%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
FormBook
2 (12.5%)
AgentTesla
2 (12.5%)
Lumma
2 (12.5%)
AsyncRAT
1 (6.3%)
XWorm
1 (6.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Social Engineering
1 (33.3%)
Phishing
1 (33.3%)
Campaign
1 (33.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
CrowdStrike
1 (20%)
Recorded Future
1 (20%)
United States
1 (20%)
Microsoft
1 (20%)
Germany
1 (20%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Additional information

Level Description
danger The process wscript.exe wrote an executable file to disk which it then attempted to execute
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious
watch A process attempted to delay the analysis task.
watch Creates a windows hook that monitors keyboard input (keylogger)
watch Drops a binary and executes it
watch Harvests credentials from local email clients
watch Looks for the Windows Idle Time to determine the uptime
watch Makes SMTP requests
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Connects to smtp.gmail.com
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
Network SURICATA Applayer Detect protocol only one direction
No Category URL CC ASN Co Date
1c2http://mail.chinaplasticsac.com/US USRadware Ltd2025.03.18
2c2http://ftp.concaribe.com/US USUNIFIEDLAYER-AS-12025.03.17
3c2http://ftp.antoniomayol.com/US USUNIFIEDLAYER-AS-12024.09.19
4c2http://ftp.jeepcommerce.rs/RS RSBeotelNet-ISP d.o.o2024.09.19
5c2http://smtp.coxenregy.com/US USPUBLIC-DOMAIN-REGISTRY2024.08.08
View only the last 5
No URL CC ASN Co Reporter Date
1http://185.215.113.117//inc/clsid.exe
AgentTesla
abus3reports2025.04.26
2https://www.grupodulcemar.pe/RG0987890000.exe
10pluspositivesinVT AgentTesla
PE PERed Cientifica Peruanaabus3reports2025.04.20
3https://www.grupodulcemar.pe/FINAL%20REVISED%20PROFORMA%20INVOICE.bat
10pluspositivesinVT AgentTesla
PE PERed Cientifica Peruanaabus3reports2025.04.20
4http://213.209.150.89/actuax.exe
AgentTesla
DE DEKeminet SHPKabus3reports2025.04.20
5http://213.209.150.89/mobix.exe
AgentTesla
DE DEKeminet SHPKabus3reports2025.04.20
View only the last 5
Beta Service, If you select keyword, you can check detailed information.