찾아줄게요
#ST 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 #ST라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
#ST 파일은 LocoScript 입니다. LocoScript에서 배포한 파일인 것으로 보입니다. 2015-12-05 01:09:01에 처음으로 보고되었으며 2015-12-05 01:09:01에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 #ST 파일을 열 수 있습니다.
-
LocoScript
-
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-07-06 21:31:15] @James_inthe_box #ficker #stealer drop: http://kubantr0.ru/7gfdg5egds.exe
-
[2021-07-04 00:05:35] @dorkingbeauty1 https://www.shodan.io/host/101.53.153.183 https://otx.alienvault.com/pulse/60e098092d446ce18b66ef0c/related/ #Headset #voip #streamdata #malware #hidden #fake #audio #low #FREQUENCY5FM #freqnetwork
-
[2021-07-01 17:07:34] @pollo290987 #ransomware #STOP de83876d36914f7a659a088bf267555e C2: /astdg.top:80/nddddhsspen6/ build2.exe c89fda6449e697936fe56fc265f82731 Note: _readme.txt Ext: .neer
-
[2021-06-28 15:22:33] @pollo290987 #Coinminer #Stratum #CryptoNight BlackKing.exe f14166e86503be1ec472ce387436c811
-
[2021-06-28 14:23:06] @pollo290987 #Stop #Ransomware 4A59.exe 6ed97e081e85cfdcfd3e95dc4156f85d Ext: .piiq Note: _readme.txt Traffic: /astdg.top/files/penelop/ https://twitter.com/pollo290987/status/1409412020978520065/photo/1
-
[2021-06-26 12:44:28] @JAMESWT_MHT #Password #Stealer Link https://bazaar.abuse.ch/sample/bac7f50c74e28687e2f18f88b4b277ecbe36acd96a00c41418b17383786142cd/ Url https://urlhaus.abuse.ch/url/1399943/ Exe https://bazaar.abuse.ch/sample/410efc30abd91864c136cc7952d17c86eaa4d843e2b745c3f9635addadec6b2f/ > https://bazaar.abuse.ch/sample/ae32233ca2a4c0ffb03a6da6154ff2610fe445bdfd8619948b09117ca44ee30b/ >> https://bazaar.abuse.ch/sample/dd7467326b5dbcd055941e33656f809480735384e671e20b91fe5ab6cdf15dc5/ >>>"Hacktool" "Password Revealer" https://bazaar.abuse.ch/sample/f4fb42c8312a6002a8783e2a1ab4571eb89e92cd192b1a21e8c4582205c37312 H/T @malwrhunterteam cc @verovaleros https://twitter.com/JAMESWT_MHT/status/1408662426493534211/photo/1
-
[2021-06-24 03:10:40] @pollo290987 #CryptBot #stealer 7ZSfxMod_x86.exe 99ac7062125f6982d0dcb5b9ff3fc3cd /mordiu01.top/index.php
-
[2021-06-24 02:49:49] @pollo290987 #Stratum #Coinminer Autoliker_v25.07.189.exe 153561f67d4c142104c36977f64a6b1d /stratum.ravenminer.com:3838
-
[2021-06-24 02:13:50] @James_inthe_box @blackhatrussia0 Try and ignore the #cryptocoin #clipboard #stealer that gets installed: b6ba05224ad05f18d6397e191b112dd0de4a0f29de5ad3f0eaa2402519e82330 https://twitter.com/James_inthe_box/status/1407778943910903810/photo/1
-
[2021-06-23 23:58:06] @malwareforme Fun little unknown #stealer C2 mimicking @Akamai akadns; contains #opendir. Targets various crypto wallets. various browser saved data (pwds. cc. cookies. etc). as well as 2fa and pwd manager extensions. https://www.virustotal.com/gui/file/6bde10caf2a906e88ab47ee8a0ff14e94a2dafa6f740bb8ab4bd21bc1fe234ea/detection https://twitter.com/malwareforme/status/1407744788502396930/photo/1
-
[2021-06-23 21:48:55] @James_inthe_box c2's: http://extilivelly.com/8/forum.php http://cludimetifte.ru/8/forum.php http://sakincesed.ru/8/forum.php #ficker #stealer drop: http://t578qnar.ru/7sdf45gsg.exe
-
[2021-06-23 01:37:14] @petrovic082 #ransomware #stop https://app.any.run/tasks/372b459f-c026-43fd-b96c-7976e78ba6ad/ https://www.virustotal.com/gui/file/c283404a0771e877ec64b45aad110df541e92ef835aa4218e05b3fa11beff721/
-
[2021-06-22 22:24:31] @SecSome hxxp://192.227.196.133/fid/ https://app.any.run/tasks/ce111075-f919-4b1d-9520-36930711022c #opendir #trojan #formbook #stealer #phishing
-
[2021-06-22 21:50:47] @James_inthe_box c2's and whatnot: http://vidompleury.com/8/forum.php http://cobleignespos.ru/8/forum.php http://moutraturche.ru/8/forum.php #ficker #stealer http://t578qnar.ru/7sdf45gsg.exe
-
[2021-06-22 04:49:22] @1ZRR4H @dark0pcodes Otro dominio relacionado qgam.top (194.147.84.117) ???? Interesante. luego de encriptar la información. obtienen el C2 desde bandakere.tumblr.com para descargar y ejecutar Vidar #Stealer (159.69.20.131). Sample: https://app.any.run/tasks/49ab286b-1f6d-43cd-be3c-11c16f70cb4f/ #Djvu / #STOP -> #Vidar / #Arkei https://twitter.com/1ZRR4H/status/1407093309340852233/photo/1
-
[2021-06-19 14:33:35] @petrovic082 #Ransomware #Stop https://www.virustotal.com/gui/file/771050c79159e37cfb2038f81371259d2057a208f2d086b54a42f311a1ada61c/detection https://www.virustotal.com/gui/file/6fdb4646a4e809988d619d40f6635c027796fed4d5b719b24ecabb7e2e0a518a/community via https://app.any.run/tasks/01bdbdfd-3570-42ff-a717-4f11fddb4284/ https://app.any.run/tasks/a4883cc0-1a44-4151-9c2b-6207d97cf99b/
-
[2021-06-19 02:02:53] @GrujaRS Sample #Stop(Djvu)#Ransomware! Extension .iqll Ransom note;_readme.txt https://www.virustotal.com/gui/file/789e58502db7458fefcde8f8f920dfbf9299461146828ddba1b57d191b07e9c9/detection https://twitter.com/GrujaRS/status/1405964250120658952/photo/1
-
[2021-06-15 21:56:01] @pollo290987 #taurus #stealer Flux.exe 484ad5a4fe183346cef417379bd0a714 C2: /xixteam.xyz/ POST: /cfg /log
-
[2021-06-13 17:43:34] @fbgwls245 #STOP #Djvu #Ransomware C6C76994FA516093B3BB1250EFA5E5427FF5E7F9AEA044692F2B080B0084D21C New ext: .pscx New Version: (v0303) Note: _readme.txt @BleepinComputer @demonslay335 @Amigo_A_ @siri_urz @malwrhunterteam @JAMESWT_MHT https://twitter.com/fbgwls245/status/1404026655983632385/photo/1
-
[2021-06-11 02:48:37] @James_inthe_box @ScarletSharkSec #ficker #stealer was here: zazno9a.ru/f7jk8uisdfkh.exe
-
[2021-06-10 16:49:35] @JAMESWT_MHT #stealer Sample ???? https://bazaar.abuse.ch/sample/5dc3085c70289a9a4a0699d883af744e8777d3b9bbe07de15e4087bcce71d3d9/ ❇️H/T @malwrhunterteam cc @verovaleros @felixw3000 @58_158_177_102 https://twitter.com/JAMESWT_MHT/status/1402925903336853505/photo/1
-
[2021-06-10 04:57:46] @James_inthe_box A #redline #stealer #yara sig for that uppity new version: https://gist.github.com/silence-is-best/911b660a9dca8268bc6effa44cef443e https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8/ https://twitter.com/James_inthe_box/status/1402746771512594439/photo/1
-
[2021-06-04 21:05:01] @AvastThreatLabs New #STOP / #Djvu #ransomware campaign. Avast observed a massive spike in infection attempts in May. Recent STOP samples also download the #Arkei / #Vidar stealer. New extensions in May: .rejg. .pcqq. .igvm. .nusm. .ehiz. .paas Sample: https://www.virustotal.com/gui/file/49eff97c11de31ced5821ed81894372318a2405375c1848131fc87bfb1282716
-
[2021-06-04 17:31:34] @bl4ckh0l3z @malwrhunterteam #SMSThief #sms #stealer ???? ????️C2 is: http://d8y7h8basx.ml Same as ???? https://twitter.com/bl4ckh0l3z/status/1350492882633895938?s= 20
-
[2021-06-04 01:47:59] @Mesiagh @FewAtoms @James_inthe_box @pmelson @abuse_ch @JAMESWT_MHT #Vidar #Stealer : Hash_1: d01e23bd4747919aef138de4a519d224b0cc5995d7b577aee5e7f9eb7d5f50fa Hash_2: cca46a2a805b2cc91101167de03608ca6aa2fc4af5b17b4400e03b392e8baf0b C2 for both: 159.69.20.131
-
[2021-06-04 01:43:13] @Mesiagh @FewAtoms @James_inthe_box @pmelson @abuse_ch @JAMESWT_MHT #RedLine #Stealer multiple files: C2s: iaditaluri.xyz bynthori.xyz cengonic.xyz 4g5d.bitrhost.ru b.hiterima.ru 188.214.133.141 176.31.56.216
-
[2021-06-04 01:29:12] @Mesiagh @FewAtoms @James_inthe_box @pmelson @abuse_ch @JAMESWT_MHT #Raccoon #Stealer: Hash: 4c77f8dd45de2772f04d175f9ee4b3dcc3f3412a84c438c65eb067c12efb13a0 C2: 34.88.140.135 Additional requests and downloads: g-cleanpartners.in noirok06.top nailedpizza.top
-
[2021-06-03 19:47:33] @c3rb3ru5d3d53c #Azorult #Stealer #Malware ???? 0e8fbfe79627d0ee014c4629a7e44c0e ???? u108337.test-handyhost.ru https://www.virustotal.com/gui/file/e901e2054019aebf7ceebc6d9ef3ed94b1428270df7824376a808f9d128f95f8/detection
-
[2021-05-26 21:38:52] @James_inthe_box build: 2505_nxat9 c2's: http://nalbukers.com/8/forum.php http://restanumb.ru/8/forum.php http://lansiagerri.ru/8/forum.php #ficker #stealer drop http://obtiron.ru/6hs8usig.exe
-
[2021-05-20 14:55:07] @fbgwls245 #STOP #Djvu #Ransomware 69E06C3DF86E3AE5365DD33E6A8B5281 014674ACA0D684C6D6958B5D473F563D 220AA39CCC6DE1EB7C8778B067E370B7 New Ext: .nusm New Version: (v0298) Note: _readme.txt @BleepinComputer @demonslay335 @Amigo_A_ @siri_urz @malwrhunterteam @JAMESWT_MHT https://twitter.com/fbgwls245/status/1395286952354537472/photo/1
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터