찾아줄게요
AC3 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 AC3라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
AC3 파일은 AC3, 오디오 파일 입니다. Dolby에서 배포한 파일인 것으로 보입니다. 2008-08-09 01:03:54에 처음으로 보고되었으며 2008-08-09 01:03:54에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 AC3 파일을 열 수 있습니다.
-
AC3, 오디오 파일
-
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-07-03 14:50:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 64 VirusTotal: https://www.virustotal.com/gui/file/c642274c1109c6de3954e68f57b897a55c262702ee6f48b5e9770ac3a1757453/detection/f-c642274c1109c6de3954e68f57b897a55c262702ee6f48b5e9770ac3a1757453-1606481118 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-07-02 12:39:02] @ankit_anubhav Maldoc -> Websettings Abuse -> /bit.ly download -> another maldoc -> CVE-2017-11882 -> #Lokibot exe -> normal c2 fre.php connections. This week volume wise #Loki is very high. Stage 1 https://www.virustotal.com/gui/file/f06415d3df49d9c8f5ac780aaaed14d0cb28d7b24ad6fdac3d043485fd98159e/detection Stage 2 https://www.virustotal.com/gui/file/d1b85d7670f9d954c9fa4301e00d42652b28d28f086a057b66368b5e6a4a15ef/detection Stage 3 https://www.virustotal.com/gui/file/667250857f2b30a82d4dd701c3f54c1fa47b033546b20082ae19fc779a526b65/detection https://twitter.com/ankit_anubhav/status/1410835384733368325/photo/1
-
[2021-07-02 11:04:51] @InQuest ???? Malicious RTF document found hosted at: https///bit.ly/2UTaZBr SHA256: d1b85d7670f9d954c9fa4301e00d42652b28d28f086a057b66368b5e6a4a15ef IOC extracted from sample: https://labs.inquest.net/dfi/hash/f06415d3df49d9c8f5ac780aaaed14d0cb28d7b24ad6fdac3d043485fd98159e
-
[2021-07-02 05:52:44] @NinjaOperator Submitted it to our internal sandbox and here's the report from VT https://www.virustotal.com/gui/file/b30342ed69b0f162c20c7be5255f5ac0bcce1aee6772436d01ac32a95578e8be/details Interesting time stamp is 6/29/21
-
[2021-07-02 00:05:39] @m0rb 2021-07-01T17:05:39 - Commented: https://www.virustotal.com/gui/file/4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7/community #malware #commandinjection
-
[2021-06-30 04:25:14] @bry_campbell REvil “decrypter” https://www.virustotal.com/gui/file/587374c9af4b1ca05426ca4bc9ac3de42547288225009ba429661d84adb1c53c/detection https://twitter.com/bry_campbell/status/1409986339987247107/photo/1
-
[2021-06-30 04:00:57] @James_inthe_box Some #wshrat and more at: https://www.cjoint.com/doc/21_06/ via hash b30342ed69b0f162c20c7be5255f5ac0bcce1aee6772436d01ac32a95578e8be thanks and cc @InQuest @Anti_Expl0it https://twitter.com/James_inthe_box/status/1409980230379311105/photo/1
-
[2021-06-29 12:04:44] @m0rb 2021-06-29T05:04:43 - Commented: https://www.virustotal.com/gui/file/4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7/community #malware #commandinjection
-
[2021-06-28 20:05:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 59 VirusTotal: https://www.virustotal.com/gui/file/fa40bdbdd5305d4fab585b65633e7c27b36ef79ccf51983f8e41ac3573ebf944/detection/f-fa40bdbdd5305d4fab585b65633e7c27b36ef79ccf51983f8e41ac3573ebf944-1617082217 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-25 13:26:48] @fbgwls245 .Poliex #Ransomware ABE8BC2AC31FB94DD985DE0D81CD4BCD C:\Users\Tiobe\source\repos\Microsoft_Edge.pdf\Microsoft_Edge.pdf\obj\Debug\Microsoft_Edge.pdf.pdb https://twitter.com/fbgwls245/status/1408310692583645188/photo/1
-
[2021-06-24 01:07:21] @MBThreatIntel ➡️ http://103.125.191.125/.-..........................-..................-/........dot ➡️ Remote template: d553bd422c8d3621e21049ccc2ebe680 ➡️ Download IP: 103.125.191.125 ➡️ Lokibot: 7847f6a1330398c7ca2252a78b6eac35
-
[2021-06-21 00:19:05] @ActorExpose Serving APK Malware hxxps://powershuttle.info/ (opendir) @Spam404 malware apk sample shared https://bazaar.abuse.ch/sample/61e49ea8ac3572e344c27742a2d53266df15266d0163470bbb56e5cd7ad78a4b/ https://twitter.com/ActorExpose/status/1406662904263421954/photo/1
-
[2021-06-20 02:55:00] @ignswif @SliceofCheese37 @calvinsucks https://www.virustotal.com/gui/file/72120e1a2a95d965717377620bac3201e5b7d8d812107d1dbdc6be5ce05154b8/detection
-
[2021-06-14 13:38:46] @pollo290987 #DuckyStealer #Apocalypsestealer CS GO SKIN CHANGER.exe MD5: 14be79aa92c3ebc51f734367ac317844 C2: /apocalypsee.fun/corona/corona.php?ci= https://twitter.com/pollo290987/status/1404327435739467778/photo/1
-
[2021-06-13 07:24:08] @rocco_castoro #Golang in the wild. https://www.makeuseof.com/what-you-need-to-know-about-golang-based-malware/ // https://otx.alienvault.com/pulse/60c0e3e6485b410c3cefbd4a // https://otx.alienvault.com/indicator/file/97d4d856c7ee712303adb9ac380fa31fae6b5c0fb9b51a4b270f76e8d3d9bf4b https://twitter.com/rocco_castoro/status/1403870770443350017/photo/1
-
[2021-06-10 19:16:44] @JAMESWT_MHT #signed "YAN CHING LIMITED" #Trickbot Samples https://bazaar.abuse.ch/sample/84175ba73a6a59496e2d020d05a120e9e8e94ac3a4fdea8fc381acda452bb991/ caught too by @abuse_ch https://bazaar.abuse.ch/sample/337a487f1cb8f16200a5d14cac1dac3478e95cf3077b3872d319970131bea702 Url https://urlhaus.abuse.ch/url/1348641/ and caught too by @malwrhunterteam https://twitter.com/JAMESWT_MHT/status/1402962936390459397/photo/1
-
[2021-06-08 00:15:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 63 VirusTotal: https://www.virustotal.com/gui/file/a5bbece16747a3e413efac322ff1d92a46bf8d52ef277152c952ceeacbb4ad03/detection/f-a5bbece16747a3e413efac322ff1d92a46bf8d52ef277152c952ceeacbb4ad03-1622308819 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-06 11:41:11] @SonOfATech https://www.virustotal.com/gui/file/cbb1cdfc7ed5d34afa7432d04302de367d2d53a377ad6b7fc710f501b4835d9d/detection https://www.virustotal.com/gui/file/cd48aed0327993bf1f289d2a1dc2d92cfcdabc1c8a8b12d4eae588cee6440ac3/detection https://www.virustotal.com/gui/file/33c927b3c72f84c079f88bf2d1e1fb5ee162b6f87b729886a32bcde8056e0251/detection
-
[2021-06-05 01:22:46] @InQuest ???? Malicious Office document found hosted at: https///mcsoft365.club/h/93GKd02-api/nm37fnklw.dot SHA256: a3e34808e4777e0f8ea6a2f5b43f6047541258e82270dc36d9ab05caa542c659 IOC extracted from sample: https://labs.inquest.net/dfi/hash/94e0fb454ceac3661246c926658b44aa56167d0f988dd3c4c4bd3c8143f9af26
-
[2021-06-03 16:23:12] @abuse_ch Malspam with weaponized word document distributing TrickBot (rob96) ???? docx ->.-> exe ???? Domains: micrsoft365 .live download3 .xyz docx: ???? https://bazaar.abuse.ch/sample/4835f6d3b8e1414e0176a9142c154d8b67f3cf0183ce9b230cb240ba110d8140/ dot: ???? https://bazaar.abuse.ch/sample/fd05481da74a6d89ac3c60db954e8f02a85711f9abaf12ede2d4e54eaf06a032/ exe: ???? https://bazaar.abuse.ch/sample/24dd0b8a2e2faff39ea54abc2654d91fdd7349aad14b0537f4d05a6af0b16ebe/ Payload URLs: ???? https://urlhaus.abuse.ch/browse/tag/rob96/ https://twitter.com/abuse_ch/status/1400382550565179395/photo/1
-
[2021-06-03 03:41:19] @jaimeblascob @InQuest The template downloads Trickbot from download3.xyz https://otx.alienvault.com/indicator/file/fd05481da74a6d89ac3c60db954e8f02a85711f9abaf12ede2d4e54eaf06a032 https://twitter.com/jaimeblascob/status/1400190815180410880/photo/1
-
[2021-06-03 01:10:17] @InQuest ???? Malicious Office document found hosted at: https///micrsoft365.live/extension/api-FKdq8720/template-jn02b3.dot SHA256: fd05481da74a6d89ac3c60db954e8f02a85711f9abaf12ede2d4e54eaf06a032 IOC extracted from sample: https://labs.inquest.net/dfi/hash/4835f6d3b8e1414e0176a9142c154d8b67f3cf0183ce9b230cb240ba110d8140
-
[2021-06-02 21:54:25] @Slvlombardo ⚠️#phishing scopri come guadagnare investendo in #PosteItaliane #IoC [email protected] ???? http://flafrankfurt.com/⤵️ https://www.invest-advisors.com/it/investi-in-poste/ ???? https://www.virustotal.com/gui/url/3cbde302c65e7cac3a8f004436482be6b7b952b392470740d7709cac90b62dad/detection @innovalabns @AddressIntel @AntiPhishingIta @illegalFawn @JAMESWT_MHT https://twitter.com/Slvlombardo/status/1400103515440226305/photo/1
-
[2021-06-01 19:21:45] @JAMESWT_MHT #signed "PIK MOTEL S.R.L." Samples https://bazaar.abuse.ch/browse/tag/PIK%20MOTEL%20S.R.L./ including #RaccoonStealer https://bazaar.abuse.ch/sample/c544dd2476397c624cdea7975b552cf06cbfd2ec5f87e4f3ac34df5cb906eb60 and #RedLineStealer https://bazaar.abuse.ch/sample/7f5fb937bb138c7e292ec64f79ac0b6d887d47a8b3e21153c1a05df91dfb823b/ H/T @malwrhunterteam https://twitter.com/JAMESWT_MHT/status/1399702706902732800/photo/1
-
[2021-05-29 12:55:53] @jjrruiz @bluehost @bluehostsupport Proofs: * http://virustotal.com/gui/url/b1ac8620ff2f8ca9bac3424430041f3b351a44ceeeb66ec8e6834bcd6f8a9c7d/detection * http://virustotal.com/gui/url/6cdbf86e01cdda9d964a518c5daa77a05cfa2eadbe5f41b27ed46ea858637b9b/detection * http://virustotal.com/gui/url/5919d27d2277b42d93be7bc51be6e69cbfae0afdf7f8f7b381b0e1e2d7817571/detection * http://virustotal.com/gui/url/4071a07a6a64cb2d7beba81d011b6a6263b445fccb061367783b9e2e5cbff918/detection * http://virustotal.com/gui/url/88afbc6f3b7be8952d1d304cb0e3d1082ed77faaededb1fa96d5aa5fb102efaa/detection * http://virustotal.com/gui/url/5ffe1a2e088b0083d009d9ed38f3779c2e9c65c0a03fffe576e5be21ecd354c2/detection * http://virustotal.com/gui/url/09b27c6e493880eadff162acfd8b2c402001ac9988a9ae3c52dcc7a7aebe2700/detection * http://virustotal.com/gui/url/fa5f9353b16de9465b701a67c95a47d2b35388417627f85c1cb8140af44ccf60/detection * http://virustotal.com/gui/url/d7fc2e3f5de5ca569716b093732baf79bd2caea4b3ccdfb9ed068ac13334cc4b/detection * http://virustotal.com/gui/url/6d902c71b4a9747e049060f7860633b0cc5c791837c2301b64647ffc7cd5c27e/detection
-
[2021-05-27 21:15:03] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 68 VirusTotal: https://www.virustotal.com/gui/file/fd8fd97fd5ebecbec94978cd61f094e4f518ac3e9290b625a23d37107a89124e/detection/f-fd8fd97fd5ebecbec94978cd61f094e4f518ac3e9290b625a23d37107a89124e-1586997054 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-05-27 19:25:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 57 VirusTotal: https://www.virustotal.com/gui/file/a43062b78c811a1ac3d295b1e810a486bba58dea74cdab18d4e70dba51b8d233/detection/f-a43062b78c811a1ac3d295b1e810a486bba58dea74cdab18d4e70dba51b8d233-1595421594 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-05-25 19:30:05] @davidorionmazur @twiss https://www.virustotal.com/gui/url/ac58c32d67fe1d6029b41759e037348822ac1c52815f1fa26ff445bd593f5072/detection https://www.virustotal.com/gui/file/e5093f559ac39aa371a6720f674907b33d10687a1562d71abc9869d1f5b54999/detection The URL comes back as safe and the downloaded file only had one flag. looks like a false positive. And it is definitely the installer wizard for that software. I try not to use sites like that. but that one seems safe.
-
[2021-05-22 02:32:05] @James_inthe_box @ET_Labs https://www.hybrid-analysis.com/string-search/results/874b48c076bff993df7676fc92fd0ea52f8918eb022ac37a441639f01bb0b557 ;)
-
[2021-05-20 23:47:34] @markus_neis @lazy_daemon @James_inthe_box @bbaskin also detected by @cyb3rops as Lazagne https://www.virustotal.com/gui/file/e24dad06fe270d9e8205faac32a3ddfa40f435cf43981673a51d084d8ffaf327/community https://twitter.com/markus_neis/status/1395420949328146434/photo/1
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터