찾아줄게요
386 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 386라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
386 파일은 Windows 3.x 입니다. Intel에서 배포한 파일인 것으로 보입니다. 2015-12-05 00:21:42에 처음으로 보고되었으며 2015-12-05 00:21:42에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 386 파일을 열 수 있습니다.
-
Intel 80386 프로세서 드라이버
-
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-07-05 22:14:34] @InQuest ???? Malicious file found hosted at: https///archive.org/download/arsip-30062021/ARSIP%2030062021.zip SHA256: f9b19947166077a985f1dfb7c2bf4f166af43854682b040bba24ceecd712685d IOC extracted from sample: https://labs.inquest.net/dfi/hash/354ff302b85cb1db89e1e0f01abf62bfc34538208e04cb3840fc37ab1e386849
-
[2021-07-04 04:14:31] @DmitriyMelikov The docm file downloads an executable file( Md5 810BA7D14F1454A01F8D75C4FFC8F797) that looks for other files and upload them to a remote server. > ( hxxp : // 64. 188. 13. 46 /oiasjdoaijsdoiasjd/ ) https://www.virustotal.com/gui/file/5d3220db34868fc98137b7dfb3a6ee47db386f145b534fb4a13ef5e0b5df9268/relations https://www.virustotal.com/gui/file/a20970aa236aa60d74841e7af53990c5da526f406c83fd1bedb011290517d9b0/detection @InQuest #Malware #maldoc https://twitter.com/DmitriyMelikov/status/1411433194386345986/photo/1
-
[2021-07-04 01:08:18] @micham Hello @Baby_2_Sleep ! Please kindly wakeup for a bit and investigate your #popped #WordPress install. Currently 110 unique IP addresses (of which at least one is bad: 23.105.131.186) have accessed that @Chase #phishing page on your server???? Good luck! https://www.virustotal.com/gui/url/276538f7b1c1a15e8e2a138781d99e37f6e7e1e55b79925a03bf11a8237bf558/detection https://twitter.com/micham/status/1411386332178309124/photo/1
-
[2021-07-03 04:39:32] @modmenu_noban Vous ne le trouverez pas sur #yggtorrent_p2p #yggtorrent #nero Burning ROM 2021 v23.0.1.19 (x86 + x64) Multilingual Portable. C'est upload ce soir et cadeau pour qui en veut. rapport Virustotal: https://www.virustotal.com/gui/file/4207953865f0e8aa6f9fa82b25a00478b47338bce8f04c6199bb72398a702628/detection Coupez votre A-V . téléchargez exception A-V profitez https://twitter.com/modmenu_noban/status/1411077102959579137/photo/1
-
[2021-07-01 10:44:29] @InQuest ???? Malicious RTF document found hosted at: https///[email protected]/3w9TmdD SHA256: 3ffa86c23ab644e5263b7302cfd5219e0c9add0e482f1b1f9eebf80d75a6eb63 IOC extracted from sample: https://labs.inquest.net/dfi/hash/b131ccc7c1512ce439277c163cfbebaede4c9386a66111f1ffbbc1a95e039451
-
[2021-06-29 22:47:22] @GossiTheDog It’s about a year old but if it helps research - https://www.virustotal.com/gui/file/f972e4c87614e56523b4a90b2735f556725fdd05386542c134223a773968fc94/detection https://twitter.com/cryptoinsane/status/1408205222669848581
-
[2021-06-29 22:35:54] @CLocker007 @luigi_martire94 @James_inthe_box @58_158_177_102 @StopMalvertisin Thanos Builder Sample https://www.virustotal.com/gui/file/f972e4c87614e56523b4a90b2735f556725fdd05386542c134223a773968fc94/detection
-
[2021-06-27 18:51:24] @GossiTheDog Ransomware leak time - Babuk's builder. Used for making Babuk payloads and decryption. builder.exe foldername. e.g. builder.exe victim will spit out payloads for: Windows. VMware ESXi.network attached storage x86 and ARM. note.txt must contain ransom. https://www.virustotal.com/gui/file/82e560a078cd7bb4472d5af832a04c4bc8f1001bac97b1574efe9863d3f66550/detection https://twitter.com/GossiTheDog/status/1409117153182224386/photo/1
-
[2021-06-25 23:38:34] @MBThreatIntel ???????? Malicious documents with "DocuSign" template used to distribute #BazarBackdoor After dropping the backdoor it injects itself into svchost.exe Maldocs: ee6260fbc01386e306cdd4bcd57e292a ebb294f2f0625ed8d4b89e9e5290dd76 https://twitter.com/MBThreatIntel/status/1408464646546276355/photo/1
-
[2021-06-25 19:01:33] @h2jazi ed9f005f5c0e0b27386b90cd66642da9f039df6268c944d559799fa41f828dfe Сводка 24.06.2021.docx https://twitter.com/h2jazi/status/1408394933468340226/photo/1
-
[2021-06-25 16:18:57] @phishunt_io #NewPhishing | #phishing #scam ???? /thewindowshopph.com/ ???? 23.92.68.154 ☁ HVC-AS ???? cPanel. Inc. Certification Authority https://twitter.com/phishunt_io/status/1408354013863628801/photo/1
-
[2021-06-23 18:25:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 56 VirusTotal: https://www.virustotal.com/gui/file/594b3cd8f6e9c563ac7f820031cfc2b7265fc5e04841d443b6cab9f3a654386c/detection/f-594b3cd8f6e9c563ac7f820031cfc2b7265fc5e04841d443b6cab9f3a654386c-1534911508 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-23 02:07:13] @cpardue09 #ln -s :malware_traffic: 2021-06-22 (Tuesday) - #Dridex-style Excel file from yesterday still retrieving & running #CobaltStrike today - Spreadsheet: https://tria.ge/210622-ekdh2kvp8j - URL for Cobalt Strike: https://urlhaus.abuse.ch/url/1386065/ - Cobalt Strike EXE: … https://twitter.com/malware_traffic/status/1407411585254137856/photo/1
-
[2021-06-23 01:54:05] @malware_traffic 2021-06-22 (Tuesday) - #Dridex-style Excel file from yesterday still retrieving & running #CobaltStrike today - Spreadsheet: https://tria.ge/210622-ekdh2kvp8j - URL for Cobalt Strike: https://urlhaus.abuse.ch/url/1386065/ - Cobalt Strike EXE: https://tria.ge/210622-5946tjsyc6 https://twitter.com/malware_traffic/status/1407411585254137856/photo/1
-
[2021-06-22 04:36:36] @ps66uk "Request For Machine Quotation" EML > IMG > #asyncrat 0.5.7B ca8929421ca89c108483865008ee79bd23e3386b899ffebdd897e1d072ad9e92 c2: leechong444 .ddnsgeek .com :46422/6578 https://tria.ge/210621-mp6wsjj7px
-
[2021-06-21 00:33:17] @ActorExpose Active Instagram Phish hxxp://serviceformshelp.com IP: 185.162.146.5 NuKe request @Spam404 https://twitter.com/ActorExpose/status/1406666478523408386/photo/1
-
[2021-06-18 16:50:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 59 VirusTotal: https://www.virustotal.com/gui/file/386808b12f19e7f0277fecc52ae3ef118c512b28f8f7183db76e864b2019bae0/detection/f-386808b12f19e7f0277fecc52ae3ef118c512b28f8f7183db76e864b2019bae0-1623984621 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-18 04:44:06] @pollo290987 #remcos FRaL.exe MD5: d04484dcdb8dd47d3d3b266218acd78a Version: 2.7.0 Pro Botnet: PORTUGAL C2 /portugaku386.duckdns.org:1717
-
[2021-06-17 10:42:06] @dubstard The same IP 199.188.200.78 is hosting all sorts of other cyber crime: Phishing against LLoyds Bank UK Hermes Delivery UK Bank Intesa Sanpaolo Italy HSBC Bank UK Fake "Elon Musk" crypto scams And so on.. https://twitter.com/dubstard/status/1405370138686152710/photo/1
-
[2021-06-16 06:39:30] @cyberwar_15 #북한 #NorthKorea #프로그람 #인차 #북한식표현 #정찰총국 #라자루스 #Lazarus #박진혁 실제 공격은 민감하게 진행됐습니다. Nuri.doc 8192ee65c7cc9c19e8693a6bd29803cd 결의대회초안.doc d5e974a3386fc99d2932756ca165a451 https://securelist.com/andariel-evolves-to-target-south-korea-with-ransomware/102811/ https://twitter.com/cyberwar_15/status/1404946698846097408/photo/1
-
[2021-06-15 17:48:49] @blackorbird "PJobRAT" Spyware targeting Indian military personnel. which disguised as the latest version of Indian dating and marriage app Trendbanter.#APT http://XXX/count.php|/XXX/file_handler.php|/XXX/ping.php report: https://mp.weixin.qq.com/s/VTHvmRTeu3dw8HFyusKLqQ https://translate.google.com/translate?hl= &sl= zh-CN&tl= en&u= https%3A%2F%2Fmp.weixin.qq.com%2Fs%2FVTHvmRTeu3dw8HFyusKLqQ https://www.virustotal.com/gui/search/7bef7a2a6ba1b2aceb84ff3adb5db8b3%250A4ce92da8928a8d1d72289d126a9fe2f4%250Aa53c74fa923edce0fa5919d11f945bcc%250A9fd4b37cbaf0d44795319977118d439d%250A794b7c523bdf3dc38689209e1abb6dbc%250A02998ab92e880db2a1ddbc98f448d828%250A44cd76e590a1c8f0b8a2091884d9f699%250A807668ed4b3bd090a3b5fb57e742be0d/files https://twitter.com/blackorbird/status/1404752748919156737/photo/1
-
[2021-06-14 21:50:56] @phishunt_io #NewPhishing | #phishing #scam ???? /instagram.helpservicenotice.com/ ???? 40.85.159.125 ☁ MICROSOFT-CORP-MSN-AS-BLOCK ???? R3 https://twitter.com/phishunt_io/status/1404451292148338690/photo/1
-
[2021-06-11 14:10:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 67 VirusTotal: https://www.virustotal.com/gui/file/3ea202bbee35810d69a1ce53423d3ee386e7895a6be1befdcfd6a8274a51ef79/detection/f-3ea202bbee35810d69a1ce53423d3ee386e7895a6be1befdcfd6a8274a51ef79-1579184254 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-11 03:10:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 66 VirusTotal: https://www.virustotal.com/gui/file/1ada9cc6203b2cafae7a4881c852866b85177f0b9fd90dfc763b13138669fc28/detection/f-1ada9cc6203b2cafae7a4881c852866b85177f0b9fd90dfc763b13138669fc28-1589588487 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-10 19:22:30] @phishunt_io #NewPhishing | #phishing #scam ???? /www.googleplaygiftcard.net/ ???? 142.250.185.147 ☁ GOOGLE ???? GTS CA 1D4 https://twitter.com/phishunt_io/status/1402964386411683840/photo/1
-
[2021-06-09 17:23:25] @kyleehmke Suspicious domains msiazureedge.com ([email protected]) and azureedges.net ([email protected]) were registered through MonoVM on 6/7 a couple hours apart. Currently on non-dedicated servers. https://twitter.com/kyleehmke/status/1402572030499856386/photo/1
-
[2021-06-09 15:05:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 60 VirusTotal: https://www.virustotal.com/gui/file/d833fe282b1e263047428433c6f33f41feaa9ef7a58ed184298749f7ede4691d/detection/f-d833fe282b1e263047428433c6f33f41feaa9ef7a58ed184298749f7ede4691d-1622386517 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-09 11:41:58] @bomccss 6/9 日本語のマルウェア付きメールを確認しています。 ■件名 Re:プロフォーマインボイス ■添付ファイル プロフォーマインボイス・pdf.rar -> Proforma Invoice·pdf.exe ■サンプル https://www.virustotal.com/gui/file/5f9814bf0b8ac4f58d2d43bc921a0345a6032ba7d22211230c4773bc5c152386/detection https://tria.ge/210609-vkqmz33w6n https://app.any.run/tasks/7d6e3562-a2cc-4e0c-a187-478bd57745d1 情報窃取マルウェア #Lokibot です https://twitter.com/bomccss/status/1402486100870897668/photo/1
-
[2021-06-05 00:20:03] @ActorExpose phisher; [email protected] phish; hxxp://info.bestrears.co.za/index/NediBalars~STOVEDROP~MAX.htm phishkit sample; https://github.com/ActorExpose/kit/tree/master/info.bestrears.co.za @JCyberSec_ @PhishKitTracker @Bobby_Presto @Spam404 @ANeilan https://twitter.com/ActorExpose/status/1400864940601360386/photo/1
-
[2021-06-04 18:52:15] @bl4ckh0l3z #goontact #ios variant ???????????? ???? c870a5db9d8d384f9f243debe449f9cce09960a729bb8af5fdd076c587ebfb3f ????️C2: http://180.215.254.23:9903 https://www.redios.top ????️Download from: https://www.redios.top/123123.ipa ????Similar to https://twitter.com/bl4ckh0l3z/status/1339976719453794306?s= 20 https://twitter.com/malwrhunterteam/status/1400780373743869956 https://twitter.com/bl4ckh0l3z/status/1400782448271691776/photo/1
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터