찾아줄게요
AAC 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 AAC라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
AAC 파일은 MPEG-2, 어디밴스드 오디오 코딩 파일 입니다. MPEG에서 배포한 파일인 것으로 보입니다. 2008-08-09 01:02:57에 처음으로 보고되었으며 2008-08-09 01:02:57에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 AAC 파일을 열 수 있습니다.
-
MPEG-2, 어디밴스드 오디오 코딩 파일
-
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-07-07 02:55:32] @_Y000_ Publicidad que te manda a descargar un archivo .apk malicioso! https://sorry.waitfordownlaod.com/ZWMwMDBhMDYzNTAwMjA1MjAwMDAyMDVjMDAyMDVjMDAyMDVjMjhkNTRjYjZmYg= = /?name= Downloader&sclid= 60e4b434479281000109c99c&extra= 8284 Virustotal: https://www.virustotal.com/gui/file/a9d5a0741cc5634c6c4a3d76c39560591b97141c27bcc15a6e798aacf9597cbe/detection https://twitter.com/_Y000_/status/1412500481688182788/photo/1
-
[2021-07-02 12:33:27] @yvesago #phishing via html attached form post to s://edaacil.com/lail/UZIE/actions.php ping @malwrhunterteam @Spam404 @PhishStats https://twitter.com/yvesago/status/1410833981088669696/photo/1
-
[2021-06-28 06:33:12] @fowl2 https://www.virustotal.com/gui/file/724f12ca08716e3cb179a00ded6212deaac05394c52e6b3ed735dbeb73e080ab
-
[2021-06-26 03:04:36] @MBThreatIntel ???? New #Qbot #malspam: A new DocuSign template used to push Qbot Email -> Contains archive file -> Contains Excel file -> Drops Qbot -> Injects itself into Explorer.exe Maldocs: 27c2d85cc6aac0fe20bd951c18ac4731 27c2d85cc6aac0fe20bd951c18ac4731 66dca0051f3a152e092c5598137f7df6 https://twitter.com/MBThreatIntel/status/1408516497656500224/photo/1
-
[2021-06-26 00:25:13] @GossiTheDog @struppigel I like this one ???? https://www.virustotal.com/gui/file/13ace534c70e91b09b8f48e6e0b819bdf39d2ac7e1340409faaac99077b73759/detection
-
[2021-06-23 20:18:09] @petrovic082 #opendir hxxp://192.3.141.146/rdp/ https://www.virustotal.com/gui/file/08e40e28aab09030aacd7aa23e9f619fcabeb74f4b9e9ecf9e35310158af8901
-
[2021-06-22 20:03:39] @GossiTheDog https://www.virustotal.com/gui/file/13ace534c70e91b09b8f48e6e0b819bdf39d2ac7e1340409faaac99077b73759/detection https://twitter.com/GossiTheDog/status/1407323398129213440/photo/1
-
[2021-06-20 06:47:05] @jjrruiz @Namecheap Proofs of the #fraudulent activities: * http://virustotal.com/gui/url/31dcc8ac6e65c11bfd7a3c5b0d3a1a40b8f9a596883826bd2f5c9a600ef6903c/detection * http://virustotal.com/gui/url/d84d6ce0650a146e56fea05793a4c3937c8a3bae29e9c6e01b2c6074aea32df7/detection * http://virustotal.com/gui/url/241691b8d49d2189a9843aacb609292e6fb6611c399e2df077be269e76ba887d/detection
-
[2021-06-18 18:16:09] @DrunkBinary Correction on sample: This is not an APT28 sample. Apologies This was written by a dev at Meresburg University. There is also several ransomware samples written by them on VT as well. APT28/FANCY BEAR Zekapab CSharp Implant bc388933d56e7a7d3e2b6c97c5819539 https://www.virustotal.com/gui/file/c25e5d3c18aa6242448c10e95a794861f1a4b52305f62514414f01aacd9c24a9/details
-
[2021-06-18 11:41:21] @JAMESWT_MHT "Sua Fatura Vivo Chegou REF:946718" ???? hXXps://seudebito-online.eastus.cloudapp.azure.com/ ???? Zip https://bazaar.abuse.ch/sample/211cee55e693cb33ef2875b30e9eb98cc3f4bf3666a1c1e3e6e8bffceafa264f/ Msi https://bazaar.abuse.ch/sample/f22ee649e4377d819c87af15623076bc6a28aac49e6d99cf10c9a81d9df766b4/ ❎Dll 589MB #spy #mekotio? https://bazaar.abuse.ch/sample/7963fb66dcc4c97886484a36c7be5d94fadc99ed494cbfa1238561c1f2213275/ https://www.virustotal.com/gui/file/71005222c75e07649f800bf73a4c37ae8b2fc6cf8502b7f2d583014d2a797016/details ???? https://bazaar.abuse.ch/sample/1d3c29ed218c02e1fd85495148b7c6da847e7e70f7f186695a0d9f367db7f7ea/ cc @verovaleros @felixw3000 https://twitter.com/JAMESWT_MHT/status/1405747438250430464/photo/1
-
[2021-06-18 01:17:41] @DrunkBinary Fancy Bear/APT28 Zekapab CSharp Implant bc388933d56e7a7d3e2b6c97c5819539 https://www.virustotal.com/gui/file/c25e5d3c18aa6242448c10e95a794861f1a4b52305f62514414f01aacd9c24a9/details
-
[2021-06-17 12:31:51] @bomccss cve-2017-11882 の脆弱性をついて外部から情報窃取系マルウェア #Formbook をダウンロードします。 ■通信先 hxxp://5.181.80.123/dBP1DJiJKPecHih.exe ■ダウンロードファイル(Formbook) https://www.virustotal.com/gui/file/aac1b750d1fe48b308bc639f3b5a9d00a73af68eeac76e607162c5ab55f40e23/details ■C2 hxxp://www.merifalls.com/4kx/
-
[2021-06-10 18:45:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 61 VirusTotal: https://www.virustotal.com/gui/file/af446d10caac7affffe5417cf049184b3882d3842193f6d8f4375dcab28ff2a3/detection/f-af446d10caac7affffe5417cf049184b3882d3842193f6d8f4375dcab28ff2a3-1568126811 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-10 15:37:56] @01_security_01 VirusTotal https://www.virustotal.com/gui/file/3a34600201faac1dd440ac084c1fa238312a6f51c6500b814fd50197f600c3d5/detection
-
[2021-06-10 13:08:13] @parsan26 Possible #CVE-2021-33739 in-the-wild exploit : https://www.virustotal.com/gui/file/3a34600201faac1dd440ac084c1fa238312a6f51c6500b814fd50197f600c3d5/detection PDB : C\Users\ghostx\source\repos\test\x64\Release\test.pdb ShellCode connects to C2: 213.164.205.138:8989 https://twitter.com/parsan26/status/1402870197371891716/photo/1
-
[2021-06-09 21:54:56] @RedDrip7 Possible #CVE-2021-33739 in-the-wild exploit : https://www.virustotal.com/gui/file/3a34600201faac1dd440ac084c1fa238312a6f51c6500b814fd50197f600c3d5/detection PDB : C:\Users\ghostx\source\repos\test\x64\Release\test.pdb ShellCode connects to C2: 213.164.205.138:8989 https://twitter.com/RedDrip7/status/1402640362972147717/photo/1
-
[2021-06-07 23:35:28] @InQuest ???? Malicious Office document found hosted at: https///crabbier-airports.000webhostapp.com/12.dotm SHA256: df7baacf5a531807967b26680c7684034bb8fd9cbb1684bd2e37016ef4e37b2f IOC extracted from sample: https://labs.inquest.net/dfi/hash/6c6de6408767c240f22c797dced540a1eeaaf518dee7ce9895eab3a5ac96d057
-
[2021-06-04 20:40:25] @cyberwar_15 #북한 #NorthKorea 한미 정상회담(5.21) 참고 자료 (수정본).pif b567f7aac1574b2ba3a769702d2f6a1e https://twitter.com/cyberwar_15/status/1400809667228483590/photo/1
-
[2021-06-02 17:35:25] @malwrandpickles @malwrhunterteam @thameswater Found a similar phishing kit uploaded to VT 5 days ago for EE. Same folder structure as this particular phish. https://www.virustotal.com/gui/file/385cc21d10529b8d15e5e8e5352901dcd36f72022f723a7405a1e84e9aacaf34/detection
-
[2021-06-02 16:04:43] @InQuest ???? Malicious RTF document found hosted at: http///79.110.52.186/bayo/b.wbk SHA256: 186bd61068855b8d41c246ec002b064ebf03be5ee42f732590b9b22aac2c5892 IOC extracted from sample: https://labs.inquest.net/dfi/hash/2edf33efeb03e278872b9dc61dfc27089f24129294db5ef3c02fc2cfe8d43099
-
[2021-05-28 00:21:19] @win32kid @theotherJohnC @malwrhunterteam https://www.virustotal.com/gui/file/d81e62102d9b748aaabf4f06bf0c09a66dfaaac7836374016a5f076b6f7ed418/detection/f-d81e62102d9b748aaabf4f06bf0c09a66dfaaac7836374016a5f076b6f7ed418-1622054791 - nor does it detect redline :P
-
[2021-05-26 05:58:05] @Arkbird_SOLG Another driver of #Moriya backdoor. if somebody is interested by the sample +Yara rule Sample : https://bazaar.abuse.ch/sample/5ae232caeaf2c570e17734820df53afd75907596e7c87960a2aac171cdeccaf7/ Yara https://github.com/StrangerealIntel/DailyIOC/blob/master/2021-05-26/Moriya/MAL_Moriya_May_2021_1.yara cc @cyb3rops @c3rb3ru5d3d53c @JAMESWT_MHT @h2jazi @James_inthe_box @KorbenD_Intel @DrunkBinary https://twitter.com/Arkbird_SOLG/status/1397326130512793603/photo/1
-
[2021-05-25 23:35:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 61 VirusTotal: https://www.virustotal.com/gui/file/bf91d2497078aacd0fde7ae7880700a1a0bb47f39fbfd0f87d7ffeb45a6bf67a/detection/f-bf91d2497078aacd0fde7ae7880700a1a0bb47f39fbfd0f87d7ffeb45a6bf67a-1581307819 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-05-20 23:47:34] @markus_neis @lazy_daemon @James_inthe_box @bbaskin also detected by @cyb3rops as Lazagne https://www.virustotal.com/gui/file/e24dad06fe270d9e8205faac32a3ddfa40f435cf43981673a51d084d8ffaf327/community https://twitter.com/markus_neis/status/1395420949328146434/photo/1
-
[2021-05-18 14:56:20] @cyb3rops @FSecureLabs Or check this sample submitted from the United Arab Emirates in September 2020. Neither I. nor Kaspersky or FireEye had coverage back then. although the framework has been released 1 year before. https://www.virustotal.com/gui/file/cd5e0152db06472f37bdfb23dd4b9ed40d642c4aac24406cb4c6d73adf80faa7/detection https://twitter.com/cyb3rops/status/1394562485684944898/photo/1
-
[2021-05-17 22:57:47] @JAMESWT_MHT "Sales Receipt" spam email spread #Dridex via #QuickBooks Payments Xls https://bazaar.abuse.ch/sample/5fec3243211a9b7914380b2041ca51542b86c8fe65f8db8fca93f4aa085e40e0/ Dll https://bazaar.abuse.ch/sample/910ef889137af8abbeb26f53e9a1dd19b93ea2f0a3aed06d471c38372afecddf/ https://bazaar.abuse.ch/sample/edcb829f7cfe532ee76180079319b48d00bf28e2762a45cf704aac4c22ec063a/ Url Dll https://urlhaus.abuse.ch/browse/tag/dridex Email Template???????????? https://twitter.com/JAMESWT_MHT/status/1394261862141792259 https://twitter.com/JAMESWT_MHT/status/1394321257345257472/photo/1
-
[2021-05-11 18:45:03] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 55 VirusTotal: https://www.virustotal.com/gui/file/6c846177db86a52834ad877bb0db59aeabaaca9ea8385f5fee33df32dd8221e2/detection/f-6c846177db86a52834ad877bb0db59aeabaaca9ea8385f5fee33df32dd8221e2-1518676731 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-05-11 18:15:03] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 63 VirusTotal: https://www.virustotal.com/gui/file/de61c52c4ccf363aacf809de553c500a8194c036b749b651f4e48d60f4f622c6/detection/f-de61c52c4ccf363aacf809de553c500a8194c036b749b651f4e48d60f4f622c6-1608851153 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-05-11 04:36:36] @jjrruiz @EasyWP Proofs: * http://virustotal.com/gui/url/14c16365ec4d2f3b14097b9640fac7beb8ac09603dea17e3f020917a511b57f4 * http://virustotal.com/gui/url/20a4938abad33eca94d8fdd9059a5c59ff3634de9602f5ef94665ca0a2d04a54 * http://virustotal.com/gui/url/afb62c757a225a7820c663b49f17a3e0034da74d27cce01c9b800424ed79ba9c * http://virustotal.com/gui/url/e64326fcb531e3a756e4accb986e8550cfdf24bbd546f0e623ea66a7643a02cd * http://virustotal.com/gui/url/d85d94573d44393ec112ac3c6baba067bb44a2e9cfc37dfaacebddb3e3a4f566 * http://virustotal.com/gui/url/5a623f423fba1fa9e877220000c205c6cd9fd854679898219c502467e69589ad * http://virustotal.com/gui/url/0b24487f5830730b75f37dcc12cd474c2a9da371a7581578fc39c29e4f0bb5bf Please remove them as soon as possible.
-
[2021-05-09 15:28:27] @fbgwls245 New Version #LegionLocker 3.0 #Ransomware CDCCF5B587AAC1A4AEB53F8AAA465759 New ext: .LGNLCKD Note: LegionReadMe.txt @BleepinComputer @demonslay335 @Amigo_A_ @siri_urz @malwrhunterteam @JAMESWT_MHT https://twitter.com/fbgwls245/status/1391309074487152640/photo/1
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터