찾아줄게요
STL 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 STL라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
STL 파일은 3D 모델 파일 입니다. 3D Systems에서 배포한 파일인 것으로 보입니다. 2018-11-29 02:48:03에 처음으로 보고되었으며 2018-11-29 02:49:41에 마지막으로 보고되었습니다.
-
StereoLithography
Rhino 3D
Blender
Microsoft Windows Paint 3D (Windows 10) 프로그램을 다운로드하여 STL 파일을 열 수 있습니다. -
STL은 3D 시스템즈가 개발한 스테레오리소그래피 CAD 소프트웨어의 파일 포맷이다.
표면을 삼각형화시켜서 저장한다.
1987년 3D 시스템즈를 위해 앨버트 컨설팅 그룹이 발명한 것이다.
이 포맷은 3D 시스템즈 최초의 상업용 3D 프린터용으로 개발되었다.
초기 릴리스 이후 이 포맷은 22년 간 상대적으로 변경사항이 거의 없는 상태로 유지되었다.
2009년, 이 포맷의 업데이트판인 STL 2.0이 제안되었다.
현재는 3D 프린팅과 직간접적인 연관이 있는 많은 소프트웨어 및 장비에서 사용한다.
STL은 StereoLithography Interface Specification의 약자(배크로님)이다. -
시그니처 정보가 없습니다.
-
연관 링크 #1: https://ko.wikipedia.org/wiki/STL_(%ED%8C%8C%EC%9D%BC_%ED%8F%AC%EB%A7%B7)
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-06-23 07:28:39] @phishunt_io #NewPhishing | #phishing #scam ???? /flaviosoliver.github.io/project-facebook-signup/ ???? 185.199.108.153 ☁ FASTLY ???? DigiCert SHA2 High Assurance Server CA https://twitter.com/phishunt_io/status/1407495784619184131/photo/1
-
[2021-06-21 14:25:45] @phishunt_io #NewPhishing | #phishing #scam ???? /wil0420.github.io/itau ???? 185.199.109.153 ☁ FASTLY ???? DigiCert SHA2 High Assurance Server CA https://twitter.com/phishunt_io/status/1406875973426028565/photo/1
-
[2021-06-15 18:24:40] @phishunt_io #NewPhishing | #phishing #scam ???? /angel788.github.io/facebook-fake ???? 185.199.110.153 ☁ FASTLY ???? DigiCert SHA2 High Assurance Server CA https://twitter.com/phishunt_io/status/1404761772591099909/photo/1
-
[2021-06-07 22:17:08] @phishunt_io #NewPhishing | #phishing #scam ???? /facebookcase188444.web.app/ ???? 151.101.65.195 ☁ FASTLY ???? GTS CA 1D4 https://twitter.com/phishunt_io/status/1401921171118039041/photo/1
-
[2021-05-29 05:16:13] @Ledtech3 It looks there are quite a few hits on HA https://www.hybrid-analysis.com/yara-search/results/9ecc6d362522f2d0602b110c8442b477abdb2e496fc2733d3b77112a5a97f794 It looks mostly like executable and a bunch are not tagged as malicious. It looks like i have some downloads to look at.????
-
[2021-05-28 09:36:12] @MasafumiNegishi Another moobot variant has been scanning 9530/tcp since May 25. mostly infected in Japan. The threat actor exploited CVE-2014-8361 on 52869/tcp. Many home routers in Japan remain vulnerable to this old vulnerability. https://www.virustotal.com/gui/file/c4989cd2ffc3f7670c5c7637fad05e0f8a3eef45a3794b203620754822acac47/detection https://isc.sans.edu/port.html?port= 9530 https://twitter.com/MasafumiNegishi/status/1398105798861987840/photo/1
-
[2021-05-13 19:47:18] @JAMESWT_MHT #QakBot #Qbot #Quakbot Xls https://bazaar.abuse.ch/sample/9e1249590c351c03932bf286e6758dfeeca97b05a2fca6f2ced5a56e355d2a0a/ Dll missing Dll urls hXXps://smartpalakatva.com/edQsUZOLlE/th.html hXXps://pilstlcommodities.com/Ov4FlB3lpy/th.html https://twitter.com/JAMESWT_MHT/status/1392823770629480449/photo/1
-
[2021-05-12 01:25:35] @aaqeel87 @malware_traffic @executemalware Thanks for sharing #trickBot Behavior: 1. Allocate space in memory for trickbot payload 2. Create process with wermgr (mostly got the trick to hide shellcode when running the process) Unpacked Dll: https://www.virustotal.com/gui/file/7806c5adbd597c7c21ae08f3ca6c65a98df2ae314f033ad57ae8708c930a4af2/detection https://tria.ge/210511-d4l9ksvaye https://twitter.com/aaqeel87/status/1392184125302394890/photo/1
-
[2021-05-06 20:09:13] @yvesago #phishing s://easy-apply.netlify.app/?token= 4nndsuv9832ns834Ad&e= POST to s://api.emailjs.com for [email protected] ping @malwrhunterteam @Spam404 @PhishStats https://twitter.com/yvesago/status/1390292568328609792/photo/1
-
[2021-04-29 17:53:08] @r3dbU7z #chalubo stll alive bazaar & VT -> 5b6670ff7e93fab04a8380f88f96d0cf ee928279c96402e03ceb581eafa8ac74 Ref:1 New China ELF malware DDoS'er. https://imgur.com/a/57uOiTu 2Chalubo on KM forum https://www.kernelmode.info/forum/viewtopic6b58.html?t= 5254 3Old smpls on VT https://www.virustotal.com/gui/search/chalubo/comments Cc: @malwaremustd1e https://twitter.com/r3dbU7z/status/1387721609390305283/photo/1
-
[2021-04-26 04:40:55] @ActorExpose Active Chase Bank Phish hxxp://azraffles.co.uk/chase/firstlog.php NuKe @Spam404 https://twitter.com/ActorExpose/status/1386435077723201537/photo/1
-
[2021-04-15 05:14:54] @DynamicAnalysis @Ashrendar82 @Unnecessary_Nat @N8N_H @CoreyRForrester There is audio. It was all recorded. It’s not my job to help you do research and analysis. https://www.stltoday.com/news/multimedia/special/darren-wilsons-radio-calls-show-fatal-encounter-was-brief/html_79c17aed-0dbe-514d-ba32-bad908056790.html
-
[2021-04-02 17:18:43] @ozuma5119 #Phishing Alert⚠ #フィッシング #詐欺 hxxps://t.co/kge604C9Qs → hxxps://coincheck-46e2e.web.app/ ⚠️Phishing on Google Firebase #firebase IP: @fastly Brand: Coincheck???????? Google Safe Browsing: Green???? https://urlscan.io/result/e4d75071-fadf-4aec-9099-232bb9af51bf/ https://otx.alienvault.com/indicator/hostname/coincheck-46e2e.web.app https://twitter.com/ozuma5119/status/1377928475026157569/photo/1
-
[2021-04-02 06:29:02] @executemalware I had even less time with #hancitor. I wasn't able to get the malicious document today so mostly what I have are the senders/subjects. https://pastebin.com/kL7GFK70
-
[2021-04-01 14:58:38] @cyb3rops In the last 3 weeks. I've seen so many EDRs & big corps' tools fail in detecting Exchange related threats (mostly webshells) and @thor_scanner succeed (also THOR Lite) that I feel really proud I'd like to point out one of the exceptions & give kudos to MS https://www.virustotal.com/gui/file/a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75/detection https://twitter.com/cyb3rops/status/1377530833989419009/photo/1
-
[2021-04-01 09:30:01] @ZindagiDotTech Need to open a suspicious website without the fear of compromising your laptop? Some (mostly free) online resources: https://bit.ly/2O7HdpA https://wheregoes.com https://www.browserling.com https://www.virustotal.com/gui/ https://www.joesandbox.com/#windows https://urlscan.io #Cybersecurity https://twitter.com/ZindagiDotTech/status/1377448135186874370/photo/1
-
[2021-03-25 08:19:36] @executemalware Lastly. I also saw a #remcos #rat email today. Here are the IOCs: https://pastebin.com/rrStqEAF
-
[2021-03-20 20:49:46] @lumpi2k Virustotal ist mostly clean: https://www.virustotal.com/gui/url/a1f42f44ee6c02f94e9316163b513d15479dfad9be4d42d604ce285591cccae9/detection Hab mal einen der Links in ner Sandbox aufgerufen. Anscheinend muss der user-agent passen. denn meinem Edge in der Sandbox wurde ne nackte Seite ohne besonderen Payload ausgeliefert.
-
[2021-03-17 01:03:50] @p5yb34m #Trickbot (rob78 botnet) #TA505: .dll: ://www.linkinc.es/scss/water.php .dll Sample: https://bazaar.abuse.ch/sample/162bfebce722e1d9d4a4b67762b58c2129d5f76db40d101f2a4ab1438a795bc5/ .xlsm Sample: https://bazaar.abuse.ch/sample/3812b84217cccc7c77678ef2dc90ca48e8372350025ef43ab4c711fa5d9974b0/ C2 Traffic: https://pastebin.com/raw/XBy2rJF3 Malware Config: https://tria.ge/210316-brmdt7stle @JAMESWT_MHT
-
[2021-03-16 02:46:50] @ActorExpose Yahoo boys tutorial format website. Apparently this site shares tip and tricks with various military. romance. etc. They got their own telegram chat group for conversation http://richhustlershub.com/military-dating-format-for-yahoo @iHeartMalware @CraneHassold
-
[2021-03-13 03:42:50] @r3dbU7z #miner #cryptojacking url: miner.kek\.gay ip: 31.210.20.182 ip: 45.85.90.68 ip: 23.95.24.194 xdi-performance\.exe on VT -> https://www.virustotal.com/gui/file/83321ca040e581f76f69687b4287f2f90287d5e51db2f6fb88d25bcbd4554589/behavior/Lastline and https://www.virustotal.com/gui/file/ed2a3e363a6e6b4e13df5e00779a1318a267376b4a7878df7b0b2e75907c747e/relations Relation kek\.gay on VT -> https://www.virustotal.com/gui/domain/kek.gay/relations Ref: https://twitter.com/r3dbU7z/status/1368588670433918982 https://twitter.com/r3dbU7z/status/1370460292577173513/photo/1
-
[2021-03-11 02:34:29] @dubstard ⚠162.0.215.250 Known bad IP address. hosting mostly scams. https://twitter.com/dubstard/status/1353792796688314379
-
[2021-02-26 01:06:28] @wwp96 #opendir #LokiBot @hexlax @JAMESWT_MHT hxxp://mndytheviejupcafgast.dns.army/thevdoc/winlog.exe hxxp://or-logistlcs.com/zoro/zoro2/fre.php ea5c2bf1bc9881aca280451e8d8fdf2e https://app.any.run/tasks/bdcbe27a-57e6-49a5-8a89-ba93f29dab1c/ https://twitter.com/wwp96/status/1364985123918200833/photo/1
-
[2021-02-25 19:00:00] @reecdeep #malspam containing two attachments as #Malware #AgentTesla is targeting #Italy ???????? https://app.any.run/tasks/1bcca498-5851-477d-8d97-77cd5adc6e20 ???? [email protected] us2.smtp.mailhostbox.com #infosec #CyberSecurity #cybercrime #cyberattacks #Security #Cyber 2nd attach ???? https://twitter.com/reecdeep/status/1364888976079740928?s= 20 https://twitter.com/reecdeep/status/1364892901600350212/photo/1
-
[2021-02-24 20:36:32] @JAMESWT_MHT " AllBestLogistics: New Shipment order " spam email spread #GuLoader Xz https://bazaar.abuse.ch/sample/899e81b38d4848e4e6afe5d65b61838e444a23e98511120788e5adaba21ed83f/ Exe https://bazaar.abuse.ch/sample/39874f3eb3d660ef8af1c02af08ddfa4d3dc14aedf2c216e3e1f8639813bf2e1/ H/T @FBussoletti cc @malwrhunterteam @AgidCert @guelfoweb @Jan0fficial @lazyactivist192 @sugimu_sec @58_158_177_102 @verovaleros @cocaman @fr0s7_ @ffforward https://twitter.com/JAMESWT_MHT/status/1364554805604155398/photo/1
-
[2021-02-23 15:50:32] @reecdeep #Shellcode inside #VelvetSweatshop encrypted XLSX reveals #Lokibot #Malware hxxp://ow.ly/GNEu30rxT59 ⬇️ hxxp://nitengystdylunatsthj.dns.army/engdoc/vbc.exe ???? hxxp://or-logistlcs.com/zoro/zoro3/fre.php #infosec #CyberSecurity #DFIR #cybercrime #cyberattacks #Security #cyber https://twitter.com/reecdeep/status/1364120441430892545/photo/1
-
[2021-02-17 19:16:27] @ActorExpose Active Phish hxxp://nasu-monogatari.com/chase/firstlog.php @ozuma5119 @tiketiketikeke
-
[2021-02-17 19:11:30] @ActorExpose Active Phish hxxp://ebinuma-strategy-school.co.jp/chase/firstlog.php @ozuma5119 @tiketiketikeke
-
[2021-02-11 08:11:30] @executemalware Lastly. here are some #dridex IOCs: https://pastebin.com/pBRp4Kfq
-
[2021-02-05 08:18:58] @executemalware Lastly. I received a couple of #remcos #rat emails today as well. The download url was an #opendir . Unfortunately. I didn't have a lot of time to analyze them but here's what I saw: https://pastebin.com/L1kR9FDW
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터