찾아줄게요
ACM 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 ACM라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
ACM 파일은 Fallout 1,2, Baulder's Gate, 인터플레이 압축 사운드 파일 입니다. BioWare에서 배포한 파일인 것으로 보입니다. 2008-08-09 01:26:59에 처음으로 보고되었으며 2021-09-09 05:32:02에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 ACM 파일을 열 수 있습니다.
-
Fallout 1,2, Baulder's Gate, 인터플레이 압축 사운드 파일
참여한 개발사로는 BioWare, Snowblind Studios, Magic Pockets, Black Isle Studios, High Voltage Software, Beamdog, Larian Studios 등이 있다. -
시그니처 정보가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-06-08 02:52:50] @ActorExpose Interesting domain from developer harvindermand :P hxxp://spys.me affliated from https://chrome.google.com/webstore/detail/omegle-ip-locator/bjlelflfdakmhpenaoodokchfhehacmh/related
-
[2021-03-21 05:24:12] @malwarelab_eu Sample MD5 013eba0050ebe18e39978e89a56c0fab @abuse_ch malware bazaar: https://bazaar.abuse.ch/sample/5fa60303a0c4fd13ecd69e7c1a17788b72605473c2fb3f93eb758010326c76e5/ @anyrun_app https://app.any.run/tasks/184a09fa-75ab-4091-904c-8b31b921504b/ @joe4security https://www.joesandbox.com/analysis/594625 @hatching_io https://tria.ge/210130-5mjcamy55n @unpacme https://www.unpac.me/results/0680b6f4-4caf-4cb4-bdaa-6c212fd9fcaf/#/ @virustotal https://www.virustotal.com/gui/file/5fa60303a0c4fd13ecd69e7c1a17788b72605473c2fb3f93eb758010326c76e5/details
-
[2021-02-11 00:36:40] @dubstard ????@scotiabank #phishing ⚠ /sc0tia-1nteracm0bile.com ☣ AS22612 192.64.117.62 ???????? ???? @Namecheap ???? Namecheap ❌@SectigoHQ (cert already revoked by Sectigo✅) cc @ActorExpose @JCyberSec_ @JAMESWT_MHT @actionfrauduk @NCSC @enisa_eu @EC3Europol @UK_Daniel_Card @NCA_UK #scam https://twitter.com/dubstard/status/1359541808682979333/photo/1
-
[2020-12-14 20:46:03] @wwp96 #opendir #LokiBot @hexlax @JAMESWT_MHT hxxp://asiacmolds.com/eog/five/fre.php db0cdd64b9cc334cb6e1ca9190355ac9 https://app.any.run/tasks/87a294b8-a344-410f-8dad-8e6e37f46a4d/ https://twitter.com/wwp96/status/1338465275142868993/photo/1
-
[2020-12-02 04:55:35] @James_inthe_box @reecdeep @lazyactivist192 @JohnnyBelinda4 @guelfoweb @VirITeXplorer @Dr_N0b0dyh @jcarndt @unpacme 18cc92453936d1267e790c489c419802403bb9544275b4a18f3472d2fe6f5dea the one I pulled this AM.
-
[2020-12-02 04:51:23] @reecdeep @lazyactivist192 @JohnnyBelinda4 @guelfoweb @James_inthe_box @VirITeXplorer @Dr_N0b0dyh @jcarndt @unpacme the 2nd link (hxxp://www.thejrgs.com/plbfyrpqio/904400.jpg) is up and alive! the below screenshot is taken while I was debugging the downloaded sample just uploaded to any run: https://app.any.run/tasks/53ee9b33-a0ff-47fb-a6fa-a2404b08e9a0 It appears to be all zeroed out as soon as it got executed! https://twitter.com/reecdeep/status/1333876372087992333/photo/1
-
[2020-12-02 04:01:39] @lazyactivist192 @reecdeep @JohnnyBelinda4 @guelfoweb @James_inthe_box @VirITeXplorer @Dr_N0b0dyh @jcarndt @unpacme Unpacked bin is https://www.virustotal.com/gui/file/1b6149fef901b81108fce37538c60bd29892eacb15518c126e995ab3e86fd5db/detection . So current distro is qakbot. If you can find what file you grabbed the C2s from. I can check and see what it was at that time.
-
[2020-12-02 03:43:30] @lazyactivist192 @reecdeep @JohnnyBelinda4 @guelfoweb @James_inthe_box @VirITeXplorer @Dr_N0b0dyh @jcarndt @unpacme https://www.virustotal.com/gui/url/55bde287e693f67ecc75ed4d8e42cf56feee1e883972015083d016b8b86f5e45/detection ITW has a larger file
-
[2020-12-02 03:39:35] @lazyactivist192 @reecdeep @JohnnyBelinda4 @guelfoweb @James_inthe_box @VirITeXplorer @Dr_N0b0dyh @jcarndt @unpacme https://www.virustotal.com/gui/file/167ec78f2154c35a7663acb13afe0d185829398ad71e8e715782f875bc77fa0e/detection
-
[2020-11-15 09:28:05] @wwp96 #AgentTesla @JAMESWT_MHT mail.dunacmotors.com eac735f6ee584eb2eb8b5dbdc8129bb4 12e1cbb4fbdf63e86440f83e5d263731 https://app.any.run/tasks/bc004ab0-7f19-4b8e-b9a8-dbdba838103f/
-
[2020-10-01 17:36:20] @abuse_ch MalwareBazaar is now using automated malware unpacking from @unpacme to provide you additional threat intel ???? ????????️ Sample report: ???? https://bazaar.abuse.ch/sample/07c4e405b915bfd4ecdbcd12c1c8ca7273e1a399e4df6eaf9951136664f3d3a5/ Special thanks to the guys from UnpacMe for supporting the project ???????????? https://twitter.com/abuse_ch/status/1311615928598233088/photo/1
-
[2020-07-31 06:59:43] @GrujaRS #Avaddon #Ransomware!Ransom note;gHavx_readme.txt Sample VT https://www.virustotal.com/gui/file/e24f69aa8738d14b85ad76a1783d51120b8b6ba467190fe7d8f96ad2969c8fdf/detection … pic.twitter.com/6DE1UacM6u
-
[2020-07-15 21:54:34] @killamjr looking at lol exe. found an exe that is base64 encoded. reversed and has some & chars thrown in. i think i got it decoded though. Sometimes malware like this is better than a CTF lol. but i think @unpacme did a better job of it https://www.unpac.me/results/ac6b089b-6b75-436f-8f24-19a9296b72c0 … https://www.virustotal.com/gui/file/4f717aaa0558a7bad3c9eb8d68d7e52a262670898586b4daaf1c0871ef1e1533/details … pic.twitter.com/h3QZVWHDQ8
-
[2020-06-30 04:57:40] @killamjr same. got the same result from unpacme + intezer https://www.unpac.me/results/4bb8d676-55f1-4943-bb11-9d3840718e8e … https://analyze.intezer.com/#/analyses/8e3573dc-de50-467f-a2b4-73da09f85886 … https://app.any.run/tasks/252a8a8d-fd77-4025-8a8a-f2125c1e0abf …
-
[2020-05-11 09:58:54] @3XS0 2020-05-05 #ursnif #gozi #malware XLS(pw:MAY4)>EXE DropURL>s://staging2.lifebiotic.com/novacms/grassandrocks.php C2> respondcritique.xyz NEWvuARb2EPotEtfAX2 type= 0 soft= 3 version= 300854 group= 202005041 id= 8576b0d0 https://app.any.run/tasks/26a3baf8-0568-40d1-9124-70ab8420fa80/ … pic.twitter.com/2hXXjJjwMw
-
[2020-05-05 23:14:12] @barisbalci1903 X banka adresinden gönderiliyormuş gibi "e-dekont.pdf.IMG" adlı bir ek ile crypto tarzı mailler gelmektedir. Sakın ola kanıp açmayın. Bilmediğiniz veya şüphelendiğiniz her şeyi telefondan açıp bakınız. Ya da aşağıdaki gibi sorgulatın.. https://www.virustotal.com/gui/file/606998b6a3524c3309df7d2d1c50cc014c0260c2d8b598126330ce813ae8f69a/detection …
-
[2020-05-05 16:38:36] @Bl4ng3l 2020-05-05 #ursnif #gozi #malware XLS(pw:MAY4)>EXE DropURL>s://staging2.lifebiotic.com/novacms/grassandrocks.php C2> respondcritique.xyz NEWvuARb2EPotEtfAX2 type= 0 soft= 3 version= 300854 group= 202005041 id= 8576b0d0 https://app.any.run/tasks/26a3baf8-0568-40d1-9124-70ab8420fa80/ … pic.twitter.com/vMN6KZrdJO
-
[2020-05-05 10:19:12] @p5yb34m #Ursnif #malspam Email Subjects: certificate #. details #. document #. price list #.xls: 'MAY__###.xls' (password MAY4) .exe: https://staging2.lifebiotic.com/novacms/grassandrocks.php C2: respondcritique.xyz https://tria.ge/reports/200505-wleydbd8gn/behavioral1 … https://app.any.run/tasks/fb0dce78-9b1f-4597-8686-11857b2a6d7d …
-
[2020-04-23 02:40:08] @IpNigh #Phishing | #PhishKit | #PhishingKit Found and downloaded. URL:hxxps://brothercafehoian.com.vn/.well-known/acme-challenge/Drive-1/OneDrive/login.php Threat Actor Emails are attached below. Bot Generated pic.twitter.com/lamk4Ziu4n
-
[2020-04-11 00:52:29] @DynamicAnalysis URLs redirect to #ZLoader DLL at: hxxp://magic8cards.com/.well-known/acme-challenge/asdfwfw/unter2.php Post infection traffic: hxxps://gynrhcoe.pw/wp-config.php hxxps://wlqaqife.icu/wp-config.php Both of these domains are currently resolving to 8.209.77.103
-
[2020-04-05 21:59:24] @IpNigh #PhishingKit found on #Phishing site. Threat Actor emails found in dump: [email protected]. [email protected]. [email protected] For more information on kits contact me.
-
[2020-03-07 06:26:52] @IpNigh #PhishingKit found on #Phishing site. Threat Actor emails found in dump: [email protected]. [email protected]. [email protected] For more information on kits contact me.
-
[2020-03-07 05:28:29] @IpNigh #PhishingKit found on #Phishing site. Threat Actor emails found in dump: [email protected]. [email protected]. [email protected] For more information on kits contact me.
-
[2020-03-06 01:42:11] @wwp96 #LokiBot @hexlax @JAMESWT_MHT hxxp://site-inspection.com/.well-known/acme-challenge/w.php/9SG2m697HNpzF 2335f2e628d92a1aaadd53fb186b3f58 54f8fc3a873d517d4a39ce0c78a62311 https://app.any.run/tasks/f23c17ef-2f41-4867-b264-8f5325368d3a …
-
[2020-02-29 01:37:27] @IpNigh #Phishing | #PhishKit | #PhishingKit Found and downloaded. URL:hxxps://airikinsulation.com/enlogincs/.well-known/acme-challenge/activate-your-account/update-your-account-information/security-measure/log-in/signin Threat Actor Emails are attached below. Bot Generated pic.twitter.com/uxQABpz7Zj
-
[2020-02-28 13:02:15] @IpNigh #PhishingKit found on #Phishing site. Threat Actor emails found in dump: [email protected]. [email protected]. [email protected]. [email protected] For more information on kits contact me.
-
[2020-02-07 13:31:58] @IpNigh #PhishingKit found on #Phishing site. Threat Actor emails found in dump: [email protected]. [email protected]. [email protected] For more information on kits contact me.
-
[2020-01-03 01:53:21] @IpNigh #Phishing | #PhishKit | #PhishingKit Found and downloaded. URL:hxxps://wgexpediciones.com/.well-known/acme-challenge/frease/cease/gersa/resas/login.php Threat Actor Emails are attached below. Bot Generated pic.twitter.com/acbOLSOaEL
-
[2020-01-02 09:08:52] @IpNigh #PhishingKit found on #Phishing site. Threat Actor emails found in dump: [email protected]. [email protected]. [email protected] For more information on kits contact me.
-
[2020-01-02 07:18:09] @IpNigh #PhishingKit found on #Phishing site. Threat Actor emails found in dump: [email protected]. [email protected]. [email protected] For more information on kits contact me.
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터