찾아줄게요
STP 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 STP라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
STP 파일은 어도비, Acrobat Exchange 플러그인 입니다. Adobe에서 배포한 파일인 것으로 보입니다. 2008-09-28 02:42:00에 처음으로 보고되었으며 2008-09-28 02:42:00에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 STP 파일을 열 수 있습니다.
-
어도비, Acrobat Exchange 플러그인
-
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-06-27 20:39:17] @AcademicoCert Risk ???? #IoT Alert ????️????????????⚙️????#IoC #mirai https://bit.ly/3di8grN #Prevention ???? IoT Devices #DFIR #BestPractices @RedCiberSeg #IncidentResponse #UserResponse
-
[2021-05-28 04:09:56] @ActorExpose Looks like cyber defacers are also dumping out data related with Israel materials exfil: [email protected] attacker nationality: Malaysian post related: https://www.facebook.com/dragonforce.my/photos/a.132980138665831/207566434540534/ leak: https://drive.google.com/drive/folders/1HCF8n6LzVR-BA-7xGMmWMEG1uhmgzftv?fbclid= IwAR1oPF8cpkknai9wN-hQLFD9r7Fj_VStpDm-iB8LospSLelVhtBTk8IYW7I https://twitter.com/ActorExpose/status/1398023690365902850/photo/1
-
[2021-05-20 06:23:31] @malware_traffic @Unit42_Intel 2021-05-19 (Wed) the latest website used for the #BazarCall method is justpayless.net (2 of 2) https://twitter.com/malware_traffic/status/1395158205811068930/photo/1
-
[2021-05-20 06:22:37] @malware_traffic @Unit42_Intel 2021-05-19 (Wed) the latest website used for the #BazarCall method is justpayless.net (1 of 2) https://twitter.com/malware_traffic/status/1395157977368236039/photo/1
-
[2021-05-13 17:59:42] @InQuest ???? Malicious Office document found hosted at: https///github.com/jojo9080/TestProject/blob/main/My.dotm?raw= true SHA256: 736a7c9cc8837772a2d3f7a610f761078e1ba6ec59e624f82e5ab55b2781a6d6 IOC extracted from sample: https://labs.inquest.net/dfi/hash/b8a7f090605744b2cc6230387118b7c8a6fdc56300528c5a01d167c08c891efe
-
[2021-05-11 15:17:50] @58_158_177_102 #cutwail preapare to spread #maldoc #ursnif Subject : Fattura BRT S.p.A. n. ***** del 11/05/21 MD5 : 392763f30bb23fd59109e1c70df61888 payload from : checking. C2 : checking .. sample : https://app.any.run/tasks/2e2325c9-1746-4af3-8c42-506ea6bfa53c https://www.virustotal.com/gui/file/05ed6d423552ca65cdc01d9329bade7ef4437e55304a6794baca37d175ee515b/detection (4/61) FirstPost https://tria.ge/210511-h2dtzwb5sa/static1
-
[2021-04-29 21:42:23] @58_158_177_102 #maldoc ppam #Aggah -> #agenttesla Payload from : yahameinhunbusorkoinai.blogspot.com C2 : 103.133.105.179 sample : https://app.any.run/tasks/6db8d031-71bf-485c-ae4f-b43e6f7a5ce8 https://www.virustotal.com/gui/file/dffd29f5fcbcb7ee1f0a4d31e3cf616b6a525275b49d9d47d625f811f48cfc08/detection (14/61) FirstPost https://tria.ge/210429-cd4l33hjf2 https://twitter.com/58_158_177_102/status/1387779300749938695/photo/1
-
[2021-04-27 20:59:03] @vikas891 #Ryuk #Ransomware | Spotted to be using this tool to bypass/disable security software. Project - https://github.com/ClownQq/YDArk https://www.virustotal.com/gui/file/12fed87f55a7230330415f294467f2f05bc72e76ec4f84f562886cdecb86bf9f/detection . Cobalt C2s: fastpighostmerch.com | 185.25.51.55
-
[2021-04-02 02:17:34] @kyleehmke Some possible UNC1878 domains from the last couple weeks: fastpighostmerch.com (213.252.247.132) shopdsld-invoce.com (185.25.51.10. rel. file: e73673efb2816913596e285623e1f6d3) fastpic-domain.com (185.25.51.67) In @ThreatConnect: https://app.threatconnect.com/auth/incident/incident.xhtml?incident= 4684318341 https://twitter.com/kyleehmke/status/1377701690137321475/photo/1
-
[2021-03-11 12:18:27] @58_158_177_102 日本語マルウェアメールの接到を確認しています #maldoc in Japanese #agenttesla Subject : 請求書893454 MD5 : 3f16b704a9fdb92eea07d360987205de sample : (3 files zipped) https://app.any.run/tasks/c2d45ecf-f8de-423b-9a77-a8d40c4b9914 https://www.virustotal.com/gui/file/27275961e1234a3a4f41e4f16a48abd3f4734a09a289d5716e182ac673d4e15e/detection (8/61) FirstPost https://tria.ge/210311-xer9mzg11e https://twitter.com/58_158_177_102/status/1369865277165375489/photo/1
-
[2021-03-09 16:32:52] @500mk500 @pmmkowalczyk @CERT_OPL @malwrhunterteam @ffforward @abuse_ch "hash: 176fa86193f2c903cf10de7910569685" <-- C2: againstpolicebrutality.top
-
[2021-02-25 06:04:54] @yungmay0 #justphishingthings #credstealing https://app.any.run/tasks/eddf74f7-0d59-46f9-bf9e-d1b58e4af5d3 hxxps://vertex3dprint.com/voicemail/ow/ow/auth/logon.aspx?replaceCurrent= 1&reason= 2&url= [email protected]
-
[2021-02-19 07:09:03] @bad_packets Active #DDoS malware payload detected: http://45.14.148.234/arm7 ( https://www.virustotal.com/gui/url/6cffe49eea97bee2c68a7b384548a1ebbdfc967e4c80e07847a04bc5aa3d97b9/details) Hosting provider: hostsolutions.ro (AS44220) ???????? Target: MVPower DVR (JAWS web server) RCE vulnerability ( https://pentestpartners.com/security-blog/pwning-cctv-cameras/) #threatintel https://twitter.com/bad_packets/status/1362539655007068160/photo/1
-
[2021-01-21 00:03:50] @Cryptolaemus1 E1 (/1600) red_dawn h/t @waga_tw https://tria.ge/210120-sstphl7q5n https://app.any.run/tasks/ed906a32-09b8-48a3-a8c9-d2fb97cfdaf7 https://twitter.com/Cryptolaemus1/status/1351923401020092416/photo/1
-
[2021-01-13 09:05:34] @Cryptolaemus1 new #emotet Epoch 3 urls ://adsavy.com/files/pJ/ ://bestpopping.com/electric-auger-n0ao3/Emwmeyje76/ ://replanliving.co.uk/wp-content/microsoft/ s://rashmimaheshwari.com/content/SIGNUP/ s://www.infoquick.co.uk/myfriends/Help/ ://calledtochange.org/CalledtoChange/Systems/
-
[2021-01-11 23:11:22] @58_158_177_102 #cutwail start to deliver #maldoc <test?> Subject : Freightquote Invoice MD5 : fa5350d4304c4c2ceafa435244b5a5fc Payload from : surikks.com/xfqtes.zip Sample : https://app.any.run/tasks/3b26a5a2-e775-463b-8110-08db86da451e https://www.virustotal.com/gui/file/0104974a7bf43e2e31d25ae485f57c62efe89eaea2d3e520db8a76fa70dd956d/detection (13/67) FirstPost https://tria.ge/210111-saglg53d6a/behavioral1
-
[2021-01-02 20:07:15] @PamelaW88926331 They do it because they know the ICO does not even abide by the laws themselves. No accountability means data abuse. http://www.donottrustthem.com ch 5 and https://www.wired.co.uk/article/ico-data-protection-gdpr-enforcement and https://uk.trustpilot.com/review/ico.org.uk Reveals 96%of the publics views on ICO are negative. with good reason. https://twitter.com/RoughSleep_UK/status/1345338190241157120
-
[2020-12-09 20:24:14] @58_158_177_102 #cutwail start to spread #maldoc #dridex Subject:Payment Notification Payload From (ex) : p://cro-plast.hr/g0gs7vm7a.rar Sample : https://app.any.run/tasks/b1c7f064-cd7e-4955-9b24-c10f1239b5f0 https://www.virustotal.com/gui/file/b6d779234c13411aca916eba5c99c88e0d089f693d95c5e4828cec56b413cb1b/detection (2/65) FirstPost https://tria.ge/201209-hrstfd9rpj/behavioral2
-
[2020-11-20 09:05:57] @58_158_177_102 日本語マルウェアの接到を確認しています。 #maldoc in Japanese #shathak / #TA551 / #icedid subject : <実在の件名> payload from : xgk-company2593.com C2 : rasolpewsitr.club sample : https://app.any.run/tasks/9a6231ad-313a-4dff-a22a-e087f99edbb4 https://www.virustotal.com/gui/file/7a633a8c10ec64fd3024d8735dabf0f22c9b1ee165fb0876cfc265c0f4d9bd2e/detection (16/66) FirstPost https://tria.ge/201120-syda8x4bje/behavioral1 https://twitter.com/58_158_177_102/status/1329591778635235328/photo/1
-
[2020-11-19 20:57:57] @58_158_177_102 #cutwail start to deliver #maldoc #dridex Subject:Your UPS Invoice is Ready MD5 : bb0198d56eff259292f821cf9777f4ea link : https://mail.seniormarkets.com/skirt.php (example) sample : https://app.any.run/tasks/71a3bf3b-a06e-4cfc-b089-0b164e039e41 https://www.virustotal.com/gui/file/8880aa45619f26fcb4cca6671e7decc6dcf94163344a819a156ed9f5bd414d0b/detection (6/64) FirstPost https://tria.ge/201119-74s9dj6n86/behavioral1
-
[2020-11-17 17:37:25] @58_158_177_102 #cutwail start to deliver #maldoc target to Italy #ursnif Subject:Fattura BRT S.p.A. n. 66699 del 17/11/20 MD5 : d9d41e81101162fcfbaae7e89841eb9d payload from : entratell.com sample : https://app.any.run/tasks/085853a3-f263-43af-b847-83f5ba044178/ https://www.virustotal.com/gui/file/f1be5cd2a0da607e49461958f1a9144d52e50963b75c12dce05262a86e03e32c/detection (20/64) FirstPost https://tria.ge/201117-5dzs1v1sl2/behavioral1
-
[2020-11-17 13:12:29] @58_158_177_102 related subject : Il Ministro dello sviluppo economico payload from : liveswindows.casa/opzi0n1.dll sample : https://app.any.run/tasks/bbba1932-a63b-4b1b-bd41-141e897b9a78 https://www.virustotal.com/gui/file/368ecb36c23f7dc538a549909db9b58da50b4cadddad1b21f7c40a20002c7971/detection (3/65) FirstPost https://tria.ge/201117-na5j6mxm9s/behavioral1 https://twitter.com/JAMESWT_MHT/status/1328534299688267776
-
[2020-11-04 06:59:46] @58_158_177_102 sample : https://app.any.run/tasks/6ee36ef9-13e5-454c-b94c-0eb275e28749 https://www.virustotal.com/gui/file/f26fc870692e96091097a4f2f130e7c3ead238fe30ed65cca32693dacc51068f/detection (18/67) FirstPost https://tria.ge/201103-z7bljscb7s/behavioral1
-
[2020-10-21 11:46:58] @Cryptolaemus1 New #emotet Epoch 2 urls 2/2 //bestpaylesstruckdrivingschool.com/cgi-bin/GWY0j/ //pioneerdrivered.com/cgi-bin/c7lwrb/
-
[2020-10-21 07:35:52] @abel1ma hxxp://sell.smartcrowd.ae/wp-admin/CLs6YFp/ hxxps://chromadiverse.com/wp-content/OzOlf/ hxxp://dirads.com/wp-content/Bro/ hxxp://evbshipping.com/10700k-overclock/I/ hxxp://bestpaylesstruckdrivingschool.com/cgi-bin/GWY0j/ hxxp://pioneerdrivered.com/cgi-bin/c7lwrb/
-
[2020-10-20 22:55:41] @Cryptolaemus1 new #emotet Epoch 3 urls ://nbiz.tk/wp-admin/s/ ://www.removepctrojan.com/wp-admin/A3mdppcG6/ ://kaher.edu.in/ca3/vd8xAEeez/ s://pubgaz.com/wp-admin/4L9uaT6/ s://bayseosmm.xyz/boostpanel/y3QA/ ://daland.info/wp-admin/sftJvSDAnn/ ://xhsdxm.com/abviqfpj/7y/ https://twitter.com/Cryptolaemus1/status/1318581662461157376/photo/1
-
[2020-10-20 17:33:26] @ffforward #zloader #sovietZloader from last night via google docs > /donwloadfiles.top XLS: https://bazaar.abuse.ch/sample/e758b12ea734ee85058f8d42fc1dce15f535bda4ddff3b424c92fa617622a675/ DLL: https://bazaar.abuse.ch/sample/8895213de00492d3755473bdc57627cdd9d90189b043f2a3dc7ae948d589eb1d/ #Signed LRHOEUSYOEOXISTPKZ C2 still /fqnceas.su but lot's of other domains in the config. Mails not blocked by @MSThreatProtect @MsftSecIntel https://twitter.com/ffforward/status/1318500566490845185/photo/1
-
[2020-10-14 04:20:58] @58_158_177_102 @James_inthe_box @abel1ma Thank you! I got a payload from 159.89.9.74. #zloader https://app.any.run/tasks/456e9826-3833-4a27-8017-9f4457e44b54 https://www.virustotal.com/gui/file/9f654fe304bd80d1114c515362319c59bc569a54cb445aacdf47672d56815da1/detection (FirstPost : 21/70) https://tria.ge/201013-xs83jp8xjs/behavioral1
-
[2020-09-29 05:11:29] @MBThreatIntel Credit card skimmer steals from cheese lovers. Sends stolen data to: static-trustpilot.com Victim has been informed. #Magecart #WebSkimming https://twitter.com/MBThreatIntel/status/1310703704396279808/photo/1
-
[2020-09-09 23:44:09] @James_inthe_box A couple #zloader domains: postplanet.xyz narbahe.co https://app.any.run/tasks/c563b0ca-3bda-44b6-88be-f50679c6f9de/ …
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터