찾아줄게요
AW 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 AW라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
AW 파일은 HP AdvanceWrite 입니다. Hewlett-Packard에서 배포한 파일인 것으로 보입니다. 2015-12-05 00:38:57에 처음으로 보고되었으며 2015-12-05 00:38:57에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 AW 파일을 열 수 있습니다.
-
HP AdvanceWrite
-
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-07-07 02:55:32] @_Y000_ Publicidad que te manda a descargar un archivo .apk malicioso! https://sorry.waitfordownlaod.com/ZWMwMDBhMDYzNTAwMjA1MjAwMDAyMDVjMDAyMDVjMDAyMDVjMjhkNTRjYjZmYg= = /?name= Downloader&sclid= 60e4b434479281000109c99c&extra= 8284 Virustotal: https://www.virustotal.com/gui/file/a9d5a0741cc5634c6c4a3d76c39560591b97141c27bcc15a6e798aacf9597cbe/detection https://twitter.com/_Y000_/status/1412500481688182788/photo/1
-
[2021-07-07 00:03:09] @remram44 @emilynordmann @TaguetteProject We had issues with antiviruses in the past ???? Virustotal gives it an all-green so hopefully that goes away once it isn't so brand new.. https://www.virustotal.com/gui/file/b77d0fdf0e139adb7ffc17f4b65f2d0a6358e052aa117ab92c400654e58151c7
-
[2021-07-05 22:25:09] @treetopsec https://www.virustotal.com/gui/file/3ee1dea0e945193bae77ba74c4c3d9613c3afa4ae4e2a4e1e83928a83c2e12f1/detection Hey @Respawn @EA @ForumTitanfall Nice work on getting the game back up. Here is all the malware your game let people surf to just by going to the "save titanfall site". You better be engaging CISA/FBI. I don't need either. but you're going to. #emotet
-
[2021-07-05 22:01:38] @treetopsec Cursory search from #ApexLegends #hack https://www.virustotal.com/gui/file/3ee1dea0e945193bae77ba74c4c3d9613c3afa4ae4e2a4e1e83928a83c2e12f1/detection This is just a tiny sliver. I am using a free sandbox. Emotet signatures. and a ton of other variations of Trojans to drop hell on users. #infosec folks. feel free to tell me what YOU see. #apexhacked #Respawn
-
[2021-07-05 13:09:43] @ActorExpose Defacement Incident "haven't recovered for an while" ASCII Art? exfil: [email protected]. [email protected] hxxps://www.parjan.nl source code: https://pastebin.com/raw/6apqYbCT @Spam404 @douglasmun @CSAFCert https://twitter.com/ActorExpose/status/1411930269544861698/photo/1
-
[2021-07-04 21:30:26] @ActorExpose @AlvieriD @FBI @Twitter @TwitterSupport @TwitterSafety babytwtcoin account data result https://pastebin.com/raw/y7kYSmWg
-
[2021-07-04 08:32:43] @bad_packets “Blockchain can eliminate the TCP/IP’s fundamental security flaws.” https://web.archive.org/web/20210703220948/ https://www.rsaconference.com/library/blog/understanding-blockchain-security
-
[2021-07-03 01:46:11] @BushidoToken ☣ #AgentTesla spoofing #UPS employee emails. logos. invoices. Word Doc w/ Equation Editor (CVE-2017-11882) Filenames: UPS-AIRWAY BILL_20210325115310.docx. AWB.doc. chrome.exe/vbc.exe C2: https://app.any.run/submissions/#domain:monnimonitorcloudfiles.mangospot.net Hashes: https://www.virustotal.com/gui/search/9dcbe83b39985ca2b2b2047e123e73d860b838a576092ebc1895ba2af7f87711%250A8c3684a7dc88ad3cf2b3c29d8152261a5c789a7ed5f8919286b695b07cd77269%250Ab24dca7a4be8c8bf61d8e2c17bb596caee88f6f2aabda72c14dc6f0f3684bb87 https://twitter.com/BushidoToken/status/1411033476380385286/photo/1
-
[2021-07-02 15:00:56] @reecdeep ⚠️#GuLoader #Malware targeting #Italy ???????? spawns #Lokibot "Offerta urgente" MD5: BDAD7DD581E9499C956880D9363D61A3 ????hxxps://andreameixueiro.com/karin_FiAFyfucWz16.bin ???? c2: karinedocesesalgados.com.br/karin/five/fre.php #infosec #CyberSecurity #cybercrime #Security https://twitter.com/reecdeep/status/1410871093418659841/photo/1
-
[2021-07-02 14:31:46] @dubstard ????@PancakeSwap ⚠ /exchange.pancakeswap-finance-v2.site ☣ AS20068 198.252.98.70 ???????? ???? @HawkHost ???? @Namecheap ????@SectigoHQ @ActorExpose @CryptoPhishing @CryptoScamDB @JAMESWT_MHT @JCyberSec_ @PhishFort @phishunt_io @sniko_ @tehnlulz @nullcookies @Spam404 https://twitter.com/dubstard/status/1410863756167585796/photo/1
-
[2021-07-02 07:24:49] @ActorExpose Defacement incidents *.jp related domains https://hastebin.com/raw/giqiduhefa @ozuma5119 @tiketiketikeke @58_158_177_102
-
[2021-07-02 07:16:18] @ActorExpose previous defacement Incidents *.kr domains (not recovered) https://hastebin.com/raw/uqabizixim @2RunJack2 @douglasmun @CSAFCert
-
[2021-07-01 19:49:28] @ffforward 13.82.24.228 on @Azure has been used as #WarzoneRAT #AveMaria C2 for at least 12 days. Latest one from encrypted 7z > https://bazaar.abuse.ch/sample/8a1ceb6687babe6ab82a38ca344d1092a7fc9bd6dbaf3420a3311c50131928ef/ https://tria.ge/210701-nsawm3mcgn https://twitter.com/MBThreatIntel/status/1408064073963429900 https://twitter.com/ffforward/status/1410581320812556290/photo/1
-
[2021-06-29 11:45:53] @dubstard ????@Uniswap ⚠ /app-uniswap.org-exchange-swap-liquidity.site ☣ AS20068 198.252.98.64 ???????? ???? @Namecheap ???? @HawkHost @CryptoPhishing @CryptoScamDB @JAMESWT_MHT @JCyberSec_ @PhishFort @phishunt_io @sniko_ @tehnlulz @nullcookies @Spam404 #phishing #scam #ecrime #cybercrime https://twitter.com/dubstard/status/1409734845509652484/photo/1
-
[2021-06-29 07:06:59] @malware_traffic 2021-06-28 (Monday) - I saw traffic to 172.241.27.226 over TCP port 443. and it looks familiar. although I don't know if this is actually #Ramnit (which I thought had gone away a year or two ago).
-
[2021-06-28 16:58:28] @reecdeep #GuLoader targets #Italy ???????? spawning #FormBook #Malware "Invio ordine fornitore" MD5: 45E6616D2335A4A0A6AE5B8CBBAE243F ????hxxps://drive.google.com/uc?export= download&id= 1L9rOHmkZRRPLD4OXw6gSJrp_2y9_S6Hi ????c2: cunix88.com #infosec #CyberSecurity #cybercrime #Security https://twitter.com/reecdeep/status/1409451122511814657/photo/1
-
[2021-06-25 20:10:13] @petrovic082 #loader https://app.any.run/tasks/5bd580d2-5a30-4029-9783-ec4210457e2e/ https://textbin.net/raw/yxjni3whqa
-
[2021-06-25 19:21:40] @GossiTheDog Unknown to me malware if anybody bored. https://www.virustotal.com/gui/file/a7643384f48446fdf343641815b56ffd0106caab6ca6f08ae1caa2de39c7fa07/detection Spawns from pcalua.exe lolbin
-
[2021-06-24 06:12:31] @executemalware Much like yesterday. we received ~30 #hancitor emails today. Also like yesterday. I saw #ficker stealer and #cobaltstrike payloads. Here are the IOCs: https://pastebin.com/Kga0y4a6
-
[2021-06-23 05:54:51] @executemalware Today's was the start of week for #hancitor . I saw follow-up payloads of both #ficker stealer and #cobaltstrike . Here are the IOCs: https://pastebin.com/tArswBep
-
[2021-06-23 01:33:16] @h2jazi Looks like #Gamaredon #APT mal doc: 2ead55a222799281d2af1c1fec8311fba9c72c801f9f8608f8df4aede3d8f650 Сводка 20.06.2021 роз.docx http://lovers.semara.ru/DCH00-01/bewildered/gnaw/bewildered/glue/prime/gnaw/bewildered/gloves/gnaw/prime/gloves.dot https://twitter.com/h2jazi/status/1407406348644519937/photo/1
-
[2021-06-22 21:53:07] @phishunt_io #NewPhishing | #phishing #scam ???? /www.rmaster.ru/xls/media/market/wellsfargo.comV3 ???? 185.20.224.22 ☁ Domain names registrar http://REG.RU. Ltd ???? Thawte RSA CA 2018 https://twitter.com/phishunt_io/status/1407350945286135814/photo/1
-
[2021-06-22 19:10:27] @yvesago #phishing @lisalaposte s://awards.france-metal.fr/colissimo ping @malwrhunterteam @Spam404 @PhishStats https://twitter.com/yvesago/status/1407310009197903872/photo/1
-
[2021-06-22 15:54:36] @bl4ckh0l3z @illegalFawn @Namecheap @malwrhunterteam @JAMESWT_MHT @Bank_Security @JCyberSec_ @olihough86 @dubstard @YourAnonRiots @andsyn1 @douglasmun #fake #bank #app ????????????from #intesasanpaolo ????️C2 over @ngrok_ ????Related (down⚠️): https://certificato-ssl-isp.cam/isp.apk 27ebb71d3c1a0e1be41b8a65fd9b489b97b1f792cff2c36d19d04ce21e4a25c2 6a9a409921146f6a997348907bcac9a21f7960ec76ce20c56f0f1e9a1c5265c4
-
[2021-06-22 05:34:45] @InQuest ???? Malicious file found hosted at: https///github.com/Hardi-St/MobaLedLib_Docu/raw/master/Betatest/MobaLedLib-master.zip SHA256: 6dcc812226ad270cf6eb6b747707b0ac2f76ef63794ede6f10b72adbbf7527da IOC extracted from sample: https://labs.inquest.net/dfi/hash/8dd984f022a1b45b874e3a49cabe7a22ad887020db7625815b65f447538a1c3f
-
[2021-06-22 03:31:20] @SecSome #CredentialHarvester #Phishing s://pro-bee-beepro-templates.s3.amazonaws.com/custom/680703/663186/631465.html?modified= 1624299954742 https://app.any.run/tasks/d10eaf8b-f208-4551-9bbb-0a446bb1799e
-
[2021-06-21 21:36:50] @reecdeep @CapeSandbox has been able to analyze a #GuLoader sample spawning #AzoRult #Malware ⚙️ https://capesandbox.com/analysis/167302/ ????hxxps://drive.google.com/uc?export= download&id= 1EW87t-CfFEK2A6y7josyyhmW5Oazk7aL ????c2: hxxp://46.183.221.49/Panel/index.php #infosec #CyberSecurity #Security https://twitter.com/reecdeep/status/1406984458511732736/photo/1
-
[2021-06-21 15:53:58] @ActorExpose Ewhoring exfil still active on kik details :P https://pastebin.com/raw/HBv3TKCV
-
[2021-06-21 13:57:16] @reecdeep #AgentTesla #Malware from #malspam ???? fxp://ftp.adpfr.ro [email protected] #infosec #CyberSecurity #cybercrime #Security https://twitter.com/reecdeep/status/1406868808623611905/photo/1
-
[2021-06-21 04:55:54] @ActorExpose Reporting more active defacement incident domain https://pastebin.com/raw/fgUu5pn6 @mstoned7 @2RunJack2
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터