찾아줄게요
BIN 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 BIN라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
BIN 파일은 바이너리 파일 입니다. Various에서 배포한 파일인 것으로 보입니다. 2008-09-28 03:53:21에 처음으로 보고되었으며 2008-08-09 03:53:55에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 BIN 파일을 열 수 있습니다.
-
Binary의 약자로 리얼모드 드라이버이다.
-
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-07-07 00:55:04] @malware_traffic 2021-07-06 (Tuesday) - #BazarLoader (#BazaLoader) from "Stolen Image Evidence" zip archive led to #CobaltStrike - Encoded binary for Cobalt Strike at: hxxp://46.17.98.191/OuqC8rXGwlN5saz48clBNekGjhs8Kjmf - List of IOCs available at: https://github.com/brad-duncan/IOCs/blob/main/2021-07-06-BazarLoader-with-Cobalt-Strike-IOCs.txt https://twitter.com/malware_traffic/status/1412470165179092992/photo/1
-
[2021-07-06 18:01:37] @ActorExpose @emailrepio exfil: [email protected] @emailrepio https://shoppy.gg/product/miU49Qq?fbclid= IwAR2aPIaMKldDpnJimmFTJ3snZBVgUcnKGyTidAcsrohfb5-LGCYbInZsqns https://twitter.com/ActorExpose/status/1412366116853256193/photo/1
-
[2021-07-05 13:09:43] @ActorExpose Defacement Incident "haven't recovered for an while" ASCII Art? exfil: [email protected]. [email protected] hxxps://www.parjan.nl source code: https://pastebin.com/raw/6apqYbCT @Spam404 @douglasmun @CSAFCert https://twitter.com/ActorExpose/status/1411930269544861698/photo/1
-
[2021-07-04 21:30:26] @ActorExpose @AlvieriD @FBI @Twitter @TwitterSupport @TwitterSafety babytwtcoin account data result https://pastebin.com/raw/y7kYSmWg
-
[2021-07-04 00:48:26] @SQLInterstellar The REvil gang is carrying out this massive supply chain attack via a malicious update to Kaseya VSA. Kaseya is a software platform used by MSPs. Here is the binary https://www.virustotal.com/gui/file/8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd/detection
-
[2021-07-03 04:14:33] @nubesque If it matters. 7/2/2021 9:10 GMT detections for #kaseya binaries https://www.virustotal.com/gui/file/d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e/detection and https://www.virustotal.com/gui/file/8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd/detection CrowdStrike: yes PaloAlto: yes SentinelOne: no BlackBerry/(Cylance): yes elastic (Endgame): yes MSFT: yes Mcafee: yes Sophos: yes Symantec: yes Webroot: yes
-
[2021-07-03 02:39:42] @C_C_Krebs News Flash: cybercriminals are a$$holes. Keep all the Incident Response teams in mind this holiday weekend as they're in the thick of it..again. If you use Kaseya VSA. shut it down *now* until told to reactivate and initiate IR. Here's the binary: https://www.virustotal.com/gui/file/8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd/detection https://twitter.com/GossiTheDog/status/1411045233136177173
-
[2021-07-02 16:25:45] @reecdeep #AgentTesla #Malware by #GuLoader targets #Italy ???????? "BONIFICO COPIA" MD5: 8AD9C79F695CB854D1584A7E270EA48A ????hxxps://drive.google.com/uc?export= download&id= 1_tmOrsXmaRhiOpQCSlDNbbwfgNv7Dje7 ???? [email protected] -> smtp.yandex.com #infosec #CyberSecurity #cybercrime https://twitter.com/reecdeep/status/1410892438349168641/photo/1
-
[2021-07-02 15:00:56] @reecdeep ⚠️#GuLoader #Malware targeting #Italy ???????? spawns #Lokibot "Offerta urgente" MD5: BDAD7DD581E9499C956880D9363D61A3 ????hxxps://andreameixueiro.com/karin_FiAFyfucWz16.bin ???? c2: karinedocesesalgados.com.br/karin/five/fre.php #infosec #CyberSecurity #cybercrime #Security https://twitter.com/reecdeep/status/1410871093418659841/photo/1
-
[2021-07-02 07:24:49] @ActorExpose Defacement incidents *.jp related domains https://hastebin.com/raw/giqiduhefa @ozuma5119 @tiketiketikeke @58_158_177_102
-
[2021-07-02 07:16:18] @ActorExpose previous defacement Incidents *.kr domains (not recovered) https://hastebin.com/raw/uqabizixim @2RunJack2 @douglasmun @CSAFCert
-
[2021-07-02 05:44:23] @executemalware I received about 50 #hancitor emails today. As usual. I got #ficker stealer and #cobaltstrike follow-up payloads. Here are the IOCs: https://pastebin.com/Ung73BHW
-
[2021-07-02 04:32:40] @malware_traffic 2021-07-01 (Thursday) - #CobaltStrike from a #Trickbot gtag zev1 infection using securityupdateav.com on 23.19.227.147 - hxxp://23.19.227.147/afjfhfdhfdhjfggh returns script with base64 text used to generate #CobaltStrike binary - can pull it up in a browser as we speak! https://twitter.com/malware_traffic/status/1410712988135342090/photo/1
-
[2021-07-01 17:09:26] @pollo290987 #agenttesla Copia del pago.bin 5b03f25cf6875fb525cf653a755996b2 exfil: [email protected]
-
[2021-06-28 14:33:59] @pollo290987 #smokeloader idbctus 000b7d2899d3a11da6ff4ba849d2569d C2: /ppcspb.com/upload/ /mebbing.com/upload/ /twcamel.com/upload/ /howdycash.com/upload/ /lahuertasonora.com/upload/ /kpotiques.com/upload/
-
[2021-06-28 11:46:29] @KBluezr https://www.virustotal.com/graph/embed/ge3dabe6f96fd4baa8de3da951c275e644d61a4712e1d4f82becb17b498774822 https://zerobin.net/?5e3ea0b7814c74dd#GUms7+wJZOJGj8JHisqxgndzr78SCErv1KSEp7F0GLQ= #doge #dogecoin #dogearmy
-
[2021-06-26 12:44:47] @dubstard paging @Spam404 for some bulk #phish removal http://pastebin.com/0xyY130J
-
[2021-06-26 05:29:20] @danvanderster I scanned the OFJU binary responsible for the WD Live hack: https://www.virustotal.com/gui/file/227fe3d0435a53416cf2eeb08b197a4bb671f9395047eab2ee437ae48ff80489/detection Appears to be part of the Linux.Ngioweb botnet https://blog.netlab.360.com/linux-ngioweb-v2-going-after-iot-devices-en/
-
[2021-06-26 00:59:42] @KodaES @FewAtoms @abuse_ch @James_inthe_box @JAMESWT_MHT binlog.exe - https://app.any.run/tasks/8f0ec489-4d72-4043-8b81-0561d79c8a4a/ #Banker ---> drop ---> https://www.virustotal.com/gui/file/ad63b7aca5f975d4a5fcfbc76f12c581548215f2c2c27cf676c8e9e9cba390f0/detection
-
[2021-06-25 20:10:13] @petrovic082 #loader https://app.any.run/tasks/5bd580d2-5a30-4029-9783-ec4210457e2e/ https://textbin.net/raw/yxjni3whqa
-
[2021-06-25 19:21:40] @GossiTheDog Unknown to me malware if anybody bored. https://www.virustotal.com/gui/file/a7643384f48446fdf343641815b56ffd0106caab6ca6f08ae1caa2de39c7fa07/detection Spawns from pcalua.exe lolbin
-
[2021-06-25 13:35:44] @pollo290987 #dropper #glupteba #redline #smokeloader #vidar main_setup_x86x64.exe f6d2892aa237dc0714c678a31f2f5f50 #opendir /136.144.41.133/WW/ #redline 87.251.71.195:82 #Smokeloader /upload /ppcspb.com /mebbing.com /twcamel.com /howdycash.com /lahuertasonora.com /kpotiques.com
-
[2021-06-24 06:12:31] @executemalware Much like yesterday. we received ~30 #hancitor emails today. Also like yesterday. I saw #ficker stealer and #cobaltstrike payloads. Here are the IOCs: https://pastebin.com/Kga0y4a6
-
[2021-06-24 00:55:20] @pollo290987 #njRAT Free generater.bin 005a118081e0101dfa711fa6d22674c1 C2: /194.34.132.153:9365
-
[2021-06-24 00:54:19] @pollo290987 #njRAT Client.bin c02db6ed1de8be04e7966ce969ec9469 C2: /89.46.100.217:2267
-
[2021-06-24 00:48:23] @pollo290987 #njRAT asasasas.bin 8defc70f258968a507455a980aa4cfd0 /sniperexe.ddns.net
-
[2021-06-23 16:38:40] @0xrb Suspected #Pakistani Actor Compromises #Indian Power Company with New ReverseRAT #Bladabindi #njRAT #OperationSideCopy https://blog.lumen.com/suspected-pakistani-actor-compromises-indian-power-company-with-new-reverserat/ cc:@blackorbird
-
[2021-06-23 05:54:51] @executemalware Today's was the start of week for #hancitor . I saw follow-up payloads of both #ficker stealer and #cobaltstrike . Here are the IOCs: https://pastebin.com/tArswBep
-
[2021-06-22 05:38:48] @executemalware I received a couple of #agenttesla emails today. Here are the IOCs: https://pastebin.com/BcFrCBJj
-
[2021-06-22 01:39:02] @SquiblydooBlog @Ledtech3 @rpargman @Binary_Defense @anyrun_app @Ledtech3 The dropper is too large for Anyrun; I uploaded the dropper to VirusTotal https://www.virustotal.com/gui/file/a871b7708b7dc1eb6fd959946a882a5af7dafc5ac135ac840cfbb60816024933/community
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터