찾아줄게요
APP 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 APP라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
APP 파일은 dBase, 애플리케이션 생성기 객체 입니다. dBase LLC에서 배포한 파일인 것으로 보입니다. 2008-08-09 03:18:30에 처음으로 보고되었으며 2021-09-09 05:28:57에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 APP 파일을 열 수 있습니다.
-
dBase, 애플리케이션 생성기 객체
-
시그니처 정보가 없습니다.
-
연관 링크 #1: https://www.dbase.com/
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-07-07 00:21:00] @killamjr #malware #qbot https://app.any.run/tasks/a8785302-6c45-4f32-92d2-5e37298a02bc/ payload urls: hXXp://thousandsyears download/div/44376.8555986111.jpg hXXp://voopeople fun/div/44376.8555986111.jpg hXXp://uppercilio fun/div/44376.8555986111.jpg dll: https://www.virustotal.com/gui/file/2b56efdd9d771bce51087101ac109c30b81e29e583c0178d33b90ad0128d9ba8/detection
-
[2021-07-06 15:04:13] @58_158_177_102 #cutwail start to spread #maldoc #ursnif ? Subject : Sollecito di pagamento MD5 : 40253c4885c52237755e64dc8ca6e423 payload/C2: checking.. sample : https://www.virustotal.com/gui/file/00946462797de8e5636676060439d06adb4878ab1472db5c16972b2074a0400f/detection https://app.any.run/tasks/c9e4af38-78b5-40db-846b-c767401d77f9 https://tria.ge/210706-nlemx52pc6
-
[2021-07-06 08:01:16] @wwp96 #opendir @JAMESWT_MHT hxxp://136.144.41.3/LINEARcndkjncjkd/ https://app.any.run/tasks/ccdbfbe3-b790-4c40-8d7b-4a0f9a8399c2/ https://twitter.com/wwp96/status/1412215034206429186/photo/1
-
[2021-07-06 07:58:02] @wwp96 #opendir #dcrat @JAMESWT_MHT 82.146.37.195/Develop/Jabber/MsTeams/userbd/production/Longpolllinuxwindowsuniversal.php?.. d8a099b848c4801c7aead1d9ca42830b https://app.any.run/tasks/108808ef-d65a-428e-bda2-296f8ca29b2d/ https://twitter.com/wwp96/status/1412214220285005832/photo/1
-
[2021-07-06 07:54:35] @wwp96 @FewAtoms still alive hxxp://198.12.110.183/wn/vbc.exe 95477d3439411e6aa6704a73a3bb6c05 https://app.any.run/tasks/663000ba-e43e-481d-89bb-8bcbd772d5d5/ https://twitter.com/wwp96/status/1412213351279644678/photo/1
-
[2021-07-06 07:49:59] @wwp96 #opendir @JAMESWT_MHT www.almacigoschile.cl 853c2c4e1ddeeb12d29299db2ad54f1d https://app.any.run/tasks/1de6358b-9461-44a9-b4af-86347e371414/ https://twitter.com/wwp96/status/1412212194503237638/photo/1
-
[2021-07-06 06:17:36] @pollo290987 #Nitro #Ransomware Win32bit.exe 5a615891fcc57b57e9deffce6f559947 EXT: .givemenitro \AppData\Local\Temp\NR_decrypt.txt
-
[2021-07-06 03:07:06] @cpardue09 #ln -s :malware_traffic: 2021-07-05 (Monday) - #RigEK sends #Redline infostealer malware. Sample of the Redline EXE available at: - https://bazaar.abuse.ch/sample/04ebbf20cfd58785ad616b81244c6901e8ed57c9c2c1c10c4bf454c035f69aa2/ - https://tria.ge/210705-9sdgvvfjwa - https://capesandbox.com/analysis/169772/ - https://app.any.run/tasks/2bbf3517-2d0b-438d-b23a-776d43f24c78 - … https://twitter.com/malware_traffic/status/1412128664721014785/photo/1
-
[2021-07-06 02:18:04] @malware_traffic 2021-07-05 (Monday) - #RigEK sends #Redline infostealer malware. Sample of the Redline EXE available at: - https://bazaar.abuse.ch/sample/04ebbf20cfd58785ad616b81244c6901e8ed57c9c2c1c10c4bf454c035f69aa2/ - https://tria.ge/210705-9sdgvvfjwa - https://capesandbox.com/analysis/169772/ - https://app.any.run/tasks/2bbf3517-2d0b-438d-b23a-776d43f24c78 - https://hybrid-analysis.com/sample/04ebbf20cfd58785ad616b81244c6901e8ed57c9c2c1c10c4bf454c035f69aa2 https://twitter.com/malware_traffic/status/1412128664721014785/photo/1
-
[2021-07-05 02:28:22] @wwp96 #blue #bot @JAMESWT_MHT hxxp://droidsec.tk/WebPanel/proxy /blog /target /botlogger.php d72261f08708b902446bc11b42fc75e6 https://app.any.run/tasks/8610938f-7bd3-4741-befb-62c5f32b1243/
-
[2021-07-05 02:25:20] @wwp96 #Betabot @JAMESWT_MHT hxxp://woeer.com/pixies/admin/admin/temp/be/megaman/order.php 23873f7412c1985c6b227e7b0a9f3ae5 https://app.any.run/tasks/c4ea39c5-00d6-4388-861b-fa189d3f9e0b/
-
[2021-07-05 02:23:32] @wwp96 #borr @JAMESWT_MHT hxxp://droidsec.tk/gate.php?id= .. 4b6578fc588a11c4388c68cf34fa79cd https://app.any.run/tasks/23c7127f-64bc-4754-bbae-11b50088b10d/
-
[2021-07-05 02:19:50] @wwp96 #LokiBot @hexlax @JAMESWT_MHT hxxp://mahetechasia.com/data/five/fre.php d9975372a070c4965f56d329571cd89a https://app.any.run/tasks/5277064f-235f-4379-81d7-27ae89d64667/
-
[2021-07-05 02:14:43] @wwp96 #opendir #LokiBot @hexlax @JAMESWT_MHT hxxps://bit.ly/2UTaZBr hxxp://103.156.91.50/vbc/s.dot hxxp://185.110.190.5/gugufdre.php/NHNmTUOdS6fzz https://app.any.run/tasks/2c6db7b3-de44-4c4c-9071-6ccf2421b4e1/ https://twitter.com/wwp96/status/1411765432877568006/photo/1
-
[2021-07-04 13:36:29] @dubstard ????@Uniswap @stable_uni ⚠ /app-uniswap.org-claims.site ☣ AS13335 172.67.156.77 ???????? ???? @Namecheap ???? @cloudflare ???? @SectigoHQ cc @CryptoPhishing @CryptoScamDB @B0R444 @JAMESWT_MHT @JCyberSec_ @PhishFort @phishunt_io @sniko_ @tehnlulz @nullcookies @Spam404 #phishing https://twitter.com/dubstard/status/1411574619870466048/photo/1
-
[2021-07-04 12:20:18] @dubstard ???? @WalletConnect ⚠ /wallectconnectdapp.org ☣ AS22612 199.188.201.106 ???????? ???? @Namecheap ???? @Namecheap ???? @SectigoHQ @ActorExpose @CryptoPhishing @CryptoScamDB @JAMESWT_MHT @JCyberSec_ @PhishFort @phishunt_io @sniko_ @tehnlulz @nullcookies @Spam404 #phishing #scam https://twitter.com/dubstard/status/1411555444653498371/photo/1
-
[2021-07-04 02:12:01] @wwp96 @JAMESWT_MHT Another: hxxp://46.183.221.10/roth/Panel/index.php bfbef487cdcd49624aeb31f540583705 https://app.any.run/tasks/b7a2d331-8c65-43b0-acb3-3f2f45d5ec34/
-
[2021-07-04 02:10:54] @wwp96 #opendir #Amadey #panel @JAMESWT_MHT @fr3dhk @ViriBack hxxp://185.215.113.55/t5BnOoke2/login.php f10db6d71da6f740bfe904a3186dc536 https://app.any.run/tasks/00f3ca2a-06c8-4d00-9d11-ff232c48a811/ https://twitter.com/wwp96/status/1411402086466588678/photo/1
-
[2021-07-03 13:27:47] @wwp96 #opendir @JAMESWT_MHT hxxps://grntexpresscourier.com/File/payload.exe b34687c70e976de965c38cc371c3cca2 - jar 428687522dd0cd2318e36b46396af8a1 - payload.exe https://app.any.run/tasks/8d149af9-6c2e-4398-819c-be5801e799a1/ https://twitter.com/wwp96/status/1411210042834051072/photo/1
-
[2021-07-03 13:19:21] @wwp96 #opendir #LokiBot @hexlax @JAMESWT_MHT hxxp://103.145.253.94/pipe/.audiodg.exe hxxp://domainaccountsupport.tk/Mrlogs/fre.php a61eb0d04d5d774fdffa7055c1a79dc1 https://app.any.run/tasks/48b4464d-6b13-450c-afd9-bc38c48901c9/ https://twitter.com/wwp96/status/1411207917953552384/photo/1
-
[2021-07-03 13:11:22] @wwp96 #Amadey #panel #opendir @JAMESWT_MHT @fr3dhk @ViriBack hxxp://185.215.113.79/g5FcvUgw/login.php https://app.any.run/tasks/8471520c-ff28-483e-9768-bb2e09bd959b/ https://twitter.com/wwp96/status/1411205910056288256/photo/1
-
[2021-07-03 04:39:32] @modmenu_noban Vous ne le trouverez pas sur #yggtorrent_p2p #yggtorrent #nero Burning ROM 2021 v23.0.1.19 (x86 + x64) Multilingual Portable. C'est upload ce soir et cadeau pour qui en veut. rapport Virustotal: https://www.virustotal.com/gui/file/4207953865f0e8aa6f9fa82b25a00478b47338bce8f04c6199bb72398a702628/detection Coupez votre A-V . téléchargez exception A-V profitez https://twitter.com/modmenu_noban/status/1411077102959579137/photo/1
-
[2021-07-03 02:41:55] @Custodian360 For any @KaseyaCorp MSP's this notification is up - https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689-Important-Notice-July-2nd-2021 Looks to be a supply chain compromise locking admin accounts and dropping ReVil following disabling Windows Defender. VT info here- https://www.virustotal.com/gui/file/d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e/detection Reddit here - https://www.reddit.com/r/kaseya/comments/ocf0x1/kaseya_has_been_hacked_with_randomware_that/?utm_medium= android_app&utm_source= share
-
[2021-07-03 01:46:11] @BushidoToken ☣ #AgentTesla spoofing #UPS employee emails. logos. invoices. Word Doc w/ Equation Editor (CVE-2017-11882) Filenames: UPS-AIRWAY BILL_20210325115310.docx. AWB.doc. chrome.exe/vbc.exe C2: https://app.any.run/submissions/#domain:monnimonitorcloudfiles.mangospot.net Hashes: https://www.virustotal.com/gui/search/9dcbe83b39985ca2b2b2047e123e73d860b838a576092ebc1895ba2af7f87711%250A8c3684a7dc88ad3cf2b3c29d8152261a5c789a7ed5f8919286b695b07cd77269%250Ab24dca7a4be8c8bf61d8e2c17bb596caee88f6f2aabda72c14dc6f0f3684bb87 https://twitter.com/BushidoToken/status/1411033476380385286/photo/1
-
[2021-07-03 00:31:34] @InQuest Looking at a low detection (4/60) @Apple Store .xlsb sheet pushing #Dridex https://labs.inquest.net/dfi/hash/81f03743b4e979719ab9ce9e0426e943186bc7906e00e7a16faa2a4746b52990 @James_inthe_box @dmoore21 @jcarndt @Cryptolaemus1 https://twitter.com/InQuest/status/1411014701555847171/photo/1
-
[2021-07-02 16:22:24] @mama_matana Low???? detected XCSSET (Pods infector) sample https://www.virustotal.com/gui/file/4e2023b7d8a7290770bebe94b6fad2a17a66b51459ba58c772c3ddbe1a14d911/detection Executes prepod command. drops malicious AppleScript downloader and LaunchAgent. C&Cs: atecasec.info. lucidapps.info. icloudserv.ru. revokecert.ru. datasomatic.ru. relativedata.ru
-
[2021-07-02 12:43:40] @InQuest ???? Malicious file found hosted at: https///cdn.discordapp.com/attachments/860170708751351860/860171759285436436/Swiftcopy.zip SHA256: 095836ae800afed643741e3ed46f27142a9df2928c28a6aa17f132b0a1184e9e IOC extracted from sample: https://labs.inquest.net/dfi/hash/ee8d059d79f1b0a00c4dc97ff552e49f20a6c87b0c2ac4632fc909d830e3b735
-
[2021-07-02 12:41:30] @InQuest ???? Malicious file found hosted at: https///cdn.discordapp.com/attachments/860170708751351860/860369971107463188/InvoicePO-03092021.zip SHA256: fba67af010c2b53e948a1502eb92dbdf88bd57795e3f4cf3898f8e77f68fbb9c IOC extracted from sample: https://labs.inquest.net/dfi/hash/ee8d059d79f1b0a00c4dc97ff552e49f20a6c87b0c2ac4632fc909d830e3b735
-
[2021-07-02 05:41:37] @malware_traffic hxxp://23.19.227.147/afjfhfdhfdhjfggh returned Powershell script for #CobaltStrike. Sample submitted to: - https://bazaar.abuse.ch/sample/a60b5b60f28039314631f9546b27d9a185e7866c78476cb45a357ca25b75f2c5/ - https://app.any.run/tasks/ed2624b2-5313-4c41-98a3-d751e4200a68 - https://capesandbox.com/submit/status/169246/ - https://tria.ge/210701-jpbsxbksza
-
[2021-07-02 00:26:55] @0xCARNAGE Remcos XLSX with CVE-2017-11882 wetcleaner.exe - MD5: 51ce1318c71a5a1ab1ed2314390d08c8 From: hXXp://conver.work/files/62_283cleaner.exe C2: 79.134.225.11:20304 https://app.any.run/tasks/d16df961-21bd-437f-9323-7fca603ded75/
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터