찾아줄게요
NEO 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 NEO라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
NEO 파일은 닌텐도DS용으로 컨버팅된 네오지오 롬파일 입니다. NINTENDO에서 배포한 파일인 것으로 보입니다. 2008-11-03 05:18:08에 처음으로 보고되었으며 2008-11-03 04:11:03에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 NEO 파일을 열 수 있습니다.
-
닌텐도DS용으로 컨버팅된 네오지오 롬파일
-
시그니처 정보가 없습니다.
-
연관 링크 #1: http://www.nintendo.co.kr/
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-06-29 14:09:15] @cyb3rops Which rules do I like the most? Answer: the generic ones Remember this when someone tells you that signature based detection is dead Sample https://www.virustotal.com/gui/file/1c89460be0f153e9cf9b2210075f29686d15d1bd168353aed6d0755097e54022/detection Rule info https://valhalla.nextron-systems.com/info/rule/SUSP_EnableContent_String_Gen Rule https://github.com/Neo23x0/signature-base/blob/master/yara/gen_susp_office_dropper.yar#L18 https://twitter.com/cyb3rops/status/1409770925147492356/photo/1
-
[2021-06-14 04:15:49] @neoxmorpheus1 @Cryptolaemus1 Tonight I received several emails from October 28th. 2020 with Word attachments. one of the links in the Word document still works. Emotet? .doc: https://bazaar.abuse.ch/sample/cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995 .exe: https://bazaar.abuse.ch/sample/8f165a26d7e9ad72cb0d51cf01076cc4b0099a244cd4e702645d36dc788dd0cc/ https://app.any.run/tasks/a1acc5fa-247c-4a9d-b1eb-92b9927ef6cd https://twitter.com/neoxmorpheus1/status/1404185764435480584/photo/1
-
[2021-05-29 19:43:04] @cyb3rops Since @MSFTSecurity and @Volexity shared so many useful information about APT29 / NOBELIUM. I do my part and share 12 YARA rules Rules https://github.com/Neo23x0/signature-base/blob/master/yara/apt_apt29_nobelium_may21.yar#L47 > I especially like the rule to detect the PDF payloads used by BoomBox PDF https://www.virustotal.com/gui/file/656384c4e5f9fe435d51edf910e7ba28b5c6d183587cf3e8f75fb2d798a01eeb/detection https://twitter.com/cyb3rops/status/1398620909368381440/photo/1
-
[2021-05-21 03:30:50] @neoxmorpheus1 Angeblichen tabellarischen Lebenslauf als Anlage erhalten? Eine .img-Datei ist kein Bild! Die darin vorgetäuschte .bmp(.lnk)-Datei ist eine Verknüpfung und ebenfalls kein Bild! Nicht öffnen! https://bazaar.abuse.ch/sample/b5bc90bc98e749201c3a0e131ca665748439bdde3adaf4d9f19de6e878707dd7/ https://twitter.com/neoxmorpheus1/status/1395477135809302530/photo/1
-
[2021-05-17 17:21:35] @Certego_Intel #Malware #Qakbot #Blocklist Domain: tpcsv.neosj.why3s.tw VirusTotal: https://www.virustotal.com/gui/domain/tpcsv.neosj.why3s.tw #CyberSecurity #ThreatIntel (bot generated)
-
[2021-05-07 03:16:28] @ActorExpose hxxps://hmgy.gov.co (Colombia Government Domain Breach Incident) hxxps://anonfiles.com/NeofK4u2ue/hmgy.gov.co_zip https://twitter.com/ActorExpose/status/1390400091048009731/photo/1
-
[2021-05-05 22:24:35] @neonprimetime @InQuest @Google vbc.exe is likely #agenttesla #snakekeylogger scheduled task persistence keylogger. credential theft evidence of SMTP and Telegram https://www.virustotal.com/gui/file/089d065fe8e39f8b19a726cb15ac216e352a5576f446c5fc38486f1fbb7a1d9c/detection https://twitter.com/neonprimetime/status/1389964247942279168/photo/1
-
[2021-05-04 02:58:15] @Racco42 @James_inthe_box @felixw3000 @VK_Intel hxxps://spectreperu.com/js/bootstrap/x7eS3Bkgfiv7sN.php xxps://spmmarines.com/wp-admin/r4brQXPL3tc6OZ.php hxxps://tim-projekt.com/plugins/content/sigplus/fields/js/goD5dPTcC.php hxxps://torneocopadelrey.com.ar/images/ie8-panel/AQlZNLOYLB.php
-
[2021-04-30 02:10:15] @neonprimetime google ads that lead to 1888 phone #Scam pdf downloaded from ad https://www.virustotal.com/gui/file/a659ec9f475458b5f19ccc7a01bcbe7b82175f7829200d55db21fe9c96eae44e/detection 1/N https://twitter.com/neonprimetime/status/1387846710307737608/photo/1
-
[2021-04-30 01:33:53] @neonprimetime #malware email. I believe its #agenttesla. received today 4/29/2021 subject: New PO #422328 attachment: ISO w/ EXE inside startup registry persistence %mailaddres%%password%%smtp%%toemail% https://www.virustotal.com/gui/file/f07b343d5a7b752a5b396b06174428a66ab98d8bb28bf33e9ea911797c32af2d/detection https://twitter.com/neonprimetime/status/1387837559531786243/photo/1
-
[2021-04-28 20:45:17] @neonprimetime live cred #phishing received today 4/28/2021 subject: Payment Copy for 19th April and 25th April 2021 hxxps://sreetech.net/font-awesome/less/?login= [email protected] https://app.any.run/tasks/7ed72caa-0e65-4a93-87f8-bad7db49ff45 https://twitter.com/neonprimetime/status/1387402544482242560/photo/1
-
[2021-04-28 03:20:14] @neonprimetime #avemaria #malware received today 4/27/2021 sub: Requirement zip attached: https://www.virustotal.com/gui/file/86b17ec2dd6ff42243356c4bf06e7b20fb044bba13d74c342c3df706e98484bd/detection unpacked exe: https://www.virustotal.com/gui/file/e85769eee5f2539084a2da5bf79027849249130be251d1f2e8b3de0021d194ab/detection scheduled task persistence c2: 104.209.133.4:7500 https://twitter.com/neonprimetime/status/1387139547025260547/photo/1
-
[2021-04-27 03:45:03] @neonprimetime @FewAtoms @abuse_ch @James_inthe_box @JAMESWT_MHT #matiex #keylogger hxxp://windowcafe.biz/momo/bob/ChIxV8ffRiFmEyg.exe https://www.virustotal.com/gui/file/54dd8453e16781342b705368fbd6e570d35a24c7c33fd2de2bd28e4b8cb25a54/detection unpacked https://www.virustotal.com/gui/file/4157a30ba36423684af0507389f1b3f41e71f095a0186a501dcfe8278f3d2fff/detection https://twitter.com/neonprimetime/status/1386783403794653185/photo/1
-
[2021-04-17 13:57:29] @comarst @albarii_sa @NEOM يارجال هذا كذاب دريويش و نعطيه النتيجة من موقعه اللي فاحص فيه https://www.virustotal.com/gui/url/5cf65b9519bc1808ce5c13064f94112543079782e138960fc39614a537b4c357 https://twitter.com/comarst/status/1383313649175986178/photo/1
-
[2021-04-13 20:27:52] @ps66uk @neonprimetime #warzonerat from s://maskcovld.ga/token/rfq/DrawingKit.exe C2 cfr.eur-import.com:6021 https://tria.ge/210413-mp9t774whx https://app.any.run/tasks/65952547-7f8a-4505-a425-0422ac4f40cf
-
[2021-04-13 20:00:32] @neonprimetime unknown #malware received this morning Subject: Wholesale Price List Attachment: 1-Copy of Quote Industro Sheet 20210413.xlsb md5: 4d0567f2d1632eb6c8e48ddaf148e764 c2: maskcovld.ga https://app.any.run/tasks/0cf85641-e5be-4979-9e97-8afc0f30fa67 https://twitter.com/neonprimetime/status/1381955462967476228/photo/1
-
[2021-04-13 01:29:40] @neonprimetime unknown #malware from 4/9/2021 Sub: A full documents 9674 google docs https://app.any.run/submissions has link to xlsb https://app.any.run/tasks/d9944a82-1be4-4754-9975-941af3119492/ tried pulling payload masterize.com.br/vendor/laravel/framework/src/Illuminate/Foundation/Console/scmcs.exe https://neonprimetime.blogspot.com/2021/04/malware-analysis-google-docs-to-docx-to.html
-
[2021-04-08 02:56:36] @neoxmorpheus1 Heute waren wieder einige gefälschte E-Mails im Namen bekannter Unternehmen wie @deutschetelekom oder @DHLPaket unterwegs. die über einen Link auf Microsoft OneDrive eine .jar-Datei verbreiten wollten. Achtung: #Schadsoftware. Link nicht anklicken! https://bazaar.abuse.ch/sample/abda456f2f4994e4e619ecfe2ef5dd2e1a4fd6d4e3be8d27074052703362eb15/ https://twitter.com/neoxmorpheus1/status/1379885841342939139/photo/1
-
[2021-03-25 14:15:12] @neoxmorpheus1 Geldtransfer-Hinweis bzw. Geldtransferbeleg der Deutschen Bank per E-Mail erhalten? Achtung: #Schadsoftware! Bild nicht anklicken / Link nicht öffnen! Datei nicht ausführen! .tgz: https://bazaar.abuse.ch/sample/56796ebb7b7b8f8daa83b88e8dc0c7d774991d685cd32ff6771b5d06a0db5317/ .tar: https://bazaar.abuse.ch/sample/8a64c2d91a2bd3f6755a1734ae7f334f5b0e07797509d402e2904091d01a4f88/ .exe: https://bazaar.abuse.ch/sample/7526681999267f8a626ee4d97755c15eb2fc8c9b2dc837f5b9e5290a0296365b/ https://twitter.com/neoxmorpheus1/status/1374968088328876037/photo/1
-
[2021-03-22 17:05:55] @JAMESWT_MHT 2/2 SMTP traffic to send infection info. smtp.ionos.fr from [email protected] to [email protected] Related #Ransomware Samples tagged in this way https://bazaar.abuse.ch/browse/tag/Filecoder.ABC/ @verovaleros @lazyactivist192 @demonslay335 @sugimu_sec https://twitter.com/JAMESWT_MHT/status/1373923887935799296/photo/1
-
[2021-03-19 06:46:15] @neoxmorpheus1 Auch ein PDF-Dokument kann Links auf #Schadsoftware enthalten: Unbekannte Dritte haben heute nach #Vorschussbetrug aussehende E-Mails verbreitet. In dem beigefügten PDF-Dokument ist ein Link auf #Schadsoftware enthalten! Nicht öffnen! .js: https://bazaar.abuse.ch/sample/262329afc152fa7205598cc6e67751a7b0634e65d2c15cbdb3d4da377a2408c1/ https://twitter.com/neoxmorpheus1/status/1372680777109024773/photo/1
-
[2021-03-19 06:32:41] @neoxmorpheus1 Antwort auf eine E-Mail bekommen? Als Anlage ist eine Datei "DEBT_Zahl_03182021.zip" beigefügt. die eine .xlsm-Datei mit dem selben Namen enthält? Vorsicht: #Schadsoftware! Anlage nicht öffnen! .zip: https://bazaar.abuse.ch/sample/f06db0847d4e11ea5daa83a877a412d381b1fe6ea1f373af68013ed710339cd6/ .xlsm: https://bazaar.abuse.ch/sample/385397f29f76534049392da4ab8831920ac6b4152f4eeb9f1d597f27cd81efe9/ https://twitter.com/neoxmorpheus1/status/1372677366040961028/photo/1
-
[2021-03-19 05:05:48] @ActorExpose Active Phish hxxps://xlink.neocities.org/unsubscribe.html stored -> hxxp://daumcommunications.000webhostapp.com/mailbox.php (inactive) source code: https://gist.githubusercontent.com/ActorExpose/242da2c63583bb1d7bcc7068d449f216/raw/c319773639277a30c2635060194962629df9c6ec/.html @neocities @JCyberSec_ @2RunJack2
-
[2021-03-16 07:07:56] @neoxmorpheus1 Auch Betrüger können mal Fehler machen: Wenn eine E-Mail der @deutschetelekom eine @DHLPaket - Paketankündigung enthält. dann stimmt was nicht. Besser Anlage nicht öffnen / Links nicht anklicken! (#Phishing und #Schadsoftware in einer E-Mail) https://bazaar.abuse.ch/sample/be8189253f7da21b232d0b9ffd24b12ccc9d039c99e9aa078b48c63d2dd9bbc1/ https://twitter.com/neoxmorpheus1/status/1371599071232819200/photo/1
-
[2021-03-14 03:22:35] @neoxmorpheus1 Schon seit 1 - 2 Wochen werden gefälschte E-Mails mit Links auf Microsoft OneDrive versendet. die eine #Schadsoftware laden. Heute kommen die E-Mails als @DHLPaket Zustellnachrichten. Öffnet nicht den Link und führt das JavaScript nicht aus! https://bazaar.abuse.ch/sample/546c86fd10855aa67a736b1df4a6288da023c21794a31d19d60120abfeef105f/ https://twitter.com/neoxmorpheus1/status/1370817586347278339/photo/1
-
[2021-03-11 07:17:08] @benmcga @SyscallE @neonprimetime @c3rb3ru5d3d53c @BushidoToken @Arkbird_SOLG @James_inthe_box @GossiTheDog @500mk500 @JRoosen @MalwareTechBlog @malwrhunterteam Looks like it. https://www.virustotal.com/gui/file/d8d6d500e0f4f0327f7d61372851dad50bd0086cf01359679e0bc050f2aa6275/detection is the mp3 sample.
-
[2021-03-03 05:50:58] @neonprimetime #malware received today 3/2/2021 subject: order 09748 Package attachment: invoice.jnlp download url: invoicesecure.net/documents https://www.joesandbox.com/analysis/361228/0/html https://www.virustotal.com/gui/file/91c8702137880cebf55f89e1d0b07df0c7c05b277850879384fa1dfe7470006c/community https://twitter.com/neonprimetime/status/1366868658954194945/photo/1
-
[2021-03-03 04:30:23] @neonprimetime live credential #phishing abusing @dropbox targeting @Office365 users final domain: 2wag32vqfdsv3nzermj9ba-on.drv.tw https://app.any.run/tasks/8fa4cbbb-a23d-4a7d-a2cf-14cddce73abc/ https://twitter.com/neonprimetime/status/1366848382153732102/photo/1
-
[2021-03-02 04:38:43] @__4ndr3y Phishing campaign https://segundavionlinevivovaloriza.koreasouth.cloudapp.azure.com with persistence creation. Communication 13.66.29.191 https://app.any.run/tasks/e5727887-2bdb-4f37-a1ad-cb43d88a9828 cc @huntingneo @ffforward @johnk3r @sirpedrotavares @dark0pcodes @malwrhunterteam @openctibr https://twitter.com/__4ndr3y/status/1366488090282500105/photo/1
-
[2021-02-27 02:30:58] @ffforward @Ledtech3 @neonprimetime @James_inthe_box @GossiTheDog @anyrun_app Nice find. Yeah this has been cleaned so it won't run. These has constantly been dropping #zloader for me. vek last friday: https://tria.ge/210219-g8t2kxnh8e If the original doc is available I could give it a go again. but I agree with @500mk500
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터