Summary: 2025/04/29 22:15

First reported date: 2013/03/05
Inquiry period : 2025/04/28 22:15 ~ 2025/04/29 22:15 (1 days), 1 search results

지난 7일 기간대비 동일한 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는
Advertising Software RCE intelligence Update 입니다.
악성코드 유형 Clop solarmarker 도 새롭게 확인됩니다.
기타 LLM documentation AI detection LinkedIn 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/29 Can We Stop Documenting Our Detections?

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Clop 1 ▲ new
2Advertising 1 ▲ 1 (100%)
3LLM 1 ▲ new
4documentation 1 ▲ new
5AI 1 ▲ new
6detection 1 ▲ new
7Software 1 ▲ 1 (100%)
8RCE 1 ▲ 1 (100%)
9intelligence 1 ▲ 1 (100%)
10Update 1 ▲ 1 (100%)
11Malware 1 - 0 (0%)
12LinkedIn 1 ▲ new
13GitHub 1 ▲ 1 (100%)
14solarmarker 1 ▲ new
15RATel 1 ▲ 1 (100%)
16powershell 1 - 0 (0%)
17United States 1 ▲ 1 (100%)
18ChatGPT 1 ▲ new
19investigative 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Clop
1 (33.3%)
solarmarker
1 (33.3%)
RATel
1 (33.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
RCE
1 (100%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
1 (100%)
Threat info
Last 5

SNS

(Total : 0)

No data.

Additional information

Level Description
danger The process powershell.exe wrote an executable file to disk which it then attempted to execute
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
watch A command shell or script process was created by an unexpected parent process
watch Communicates with host for which no DNS query was performed
watch Disables proxy possibly for traffic interception
watch Found URLs in memory pointing to an IP address rather than a domain (potentially indicative of Command & Control traffic)
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key
No data
No URL CC ASN Co Reporter Date
1https://paste.ee/d/foOP0g8Z/0
ascii powershell ps1
abuse_ch2025.04.25
2http://176.65.134.8/metacodings.txt
ascii AsyncRAT powershell ps1 rat
DE DEDiogelo Ltd.abuse_ch2025.04.25
3https://paste.ee/d/L8tHN98p/0
ascii powershell ps1 xworm
abuse_ch2025.04.25
4https://www.wilkinsonbeane.com/css/slider/asclepiadaceaebOet.php
ascii opendir powershell ps1
US USUNIFIEDLAYER-AS-1abuse_ch2025.04.25
5https://www.wilkinsonbeane.com/css/slider/sciurineslwWf.php
ascii opendir powershell ps1
US USUNIFIEDLAYER-AS-1abuse_ch2025.04.25
View only the last 5
Beta Service, If you select keyword, you can check detailed information.