찾아줄게요
BBF 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 BBF라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
BBF 파일은 점자 표현 파일(Braille Best File) 입니다. 한국점자연구위원회, 국립국어원, 문화체육관광부에서 배포한 파일인 것으로 보입니다. 2017-11-03 21:59:28에 처음으로 보고되었으며 2017-11-04 03:28:08에 마지막으로 보고되었습니다.
-
센스리더, 국가전자도서관(오프라인) 프로그램을 다운로드하여 BBF 파일을 열 수 있습니다.
-
2006년 4월 한국점자연구위원회, 국립국어원, 문화체육관광부 공표로 사용되는 BBF(Braille Best File) 점자 형식.
ㅇ ‘한국점자규정 개정을 위한 기초 연구’ 실시(2003. 7.~11.)
ㅇ 한글, 국악, 컴퓨터 분과 분과별 협의회 2회 실시(2004. 3. 30.~ 4. 17.)
ㅇ 점자연구전문위원회 전체협의회 실시(2004. 4. 24.)
ㅇ 1차 공청회: 서울맹학교(2004. 6. 4.)
ㅇ 2차 공청회: 대구대학교(2004. 6. 10.)
ㅇ 3차 공청회: 조선대학교(2004. 7. 9.)
ㅇ 4차 공청회: 대전 유성(2004. 8. 12.)
ㅇ 정부기관 및 시각장애 관련 단체 의견 수렴 및 정리(2005. 3.~7.)
ㅇ 한국점자연구위원회 제1차 심의회(2005. 8. 12.)
ㅇ 한국점자연구위원회 제2차 심의회(2005. 8. 19.)
ㅇ 국어심의회 언어정책분과위원회 개최(2005. 11. 29.)
ㅇ 점자소위원회 검토(2006. 1.~3.)
ㅇ 개정안 최종 교정 및 확정(2006. 4.) -
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-07-06 21:52:55] @R3MRUM @GobiasInfosec @0xAmit @HuntressLabs 'Officially' it started with version 2.04 but I found a beta version of 2.04 back in 10/2020 that was the initial sample where this key started being used: https://www.virustotal.com/gui/file/f6857748c050655fb3c2192b52a3b0915f3f3708cd0a59bbf641d7dd722a804d/detection
-
[2021-07-06 03:07:06] @cpardue09 #ln -s :malware_traffic: 2021-07-05 (Monday) - #RigEK sends #Redline infostealer malware. Sample of the Redline EXE available at: - https://bazaar.abuse.ch/sample/04ebbf20cfd58785ad616b81244c6901e8ed57c9c2c1c10c4bf454c035f69aa2/ - https://tria.ge/210705-9sdgvvfjwa - https://capesandbox.com/analysis/169772/ - https://app.any.run/tasks/2bbf3517-2d0b-438d-b23a-776d43f24c78 - … https://twitter.com/malware_traffic/status/1412128664721014785/photo/1
-
[2021-07-06 02:18:04] @malware_traffic 2021-07-05 (Monday) - #RigEK sends #Redline infostealer malware. Sample of the Redline EXE available at: - https://bazaar.abuse.ch/sample/04ebbf20cfd58785ad616b81244c6901e8ed57c9c2c1c10c4bf454c035f69aa2/ - https://tria.ge/210705-9sdgvvfjwa - https://capesandbox.com/analysis/169772/ - https://app.any.run/tasks/2bbf3517-2d0b-438d-b23a-776d43f24c78 - https://hybrid-analysis.com/sample/04ebbf20cfd58785ad616b81244c6901e8ed57c9c2c1c10c4bf454c035f69aa2 https://twitter.com/malware_traffic/status/1412128664721014785/photo/1
-
[2021-07-03 15:00:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 62 VirusTotal: https://www.virustotal.com/gui/file/97071a42de7b359d9250feb08cac443933a95e9bbfbd7760435f8bda9c1aa00b/detection/f-97071a42de7b359d9250feb08cac443933a95e9bbfbd7760435f8bda9c1aa00b-1622288717 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-07-01 18:20:57] @JAMESWT_MHT Mentioned "CARTA_IDENTITA" Samples rtf https://bazaar.abuse.ch/sample/abab55c3c2109d14d6efde236c6200bbf59edf9c2edc6d8a59ce6e310607bc9b/ vbe https://bazaar.abuse.ch/sample/bd63f098304c316749c2b49726aaa7c5af4c33a4de7a5049e32587491c21a113/ Run https://app.any.run/tasks/5bdbb67e-f8a4-45f5-98ef-d67943e7a484 ❗️❗️CARTA_IDENTITA.exe ❗️❗️ https://bazaar.abuse.ch/sample/99ebb7d245ea5a3535cfba9d1cc7ec71a8cef683b91522574e32170198851d7f/ ✳️Samples https://bazaar.abuse.ch/browse/tag/rinaldo/ Relations https://www.virustotal.com/gui/domain/rinaldomattei.firstcloudit.com/relations cc @verovaleros @felixw3000 @sS55752750 https://twitter.com/D3LabIT/status/1410540076447191040 https://twitter.com/JAMESWT_MHT/status/1410559041911328772/photo/1
-
[2021-06-29 22:16:01] @cyb3rops Aaand the winner is : this PCAP file literally triggering all possible detection rules in just 25MB I'd say that if you replay this in front of your NSM appliance and it doesn't show an alert. it's most likely crap https://www.virustotal.com/gui/file/baf013b1a0a3c19287797ca2f85d31f63ae53783ba66cd0fc21472132ccbbf12/detection https://twitter.com/cyb3rops/status/1409893425638514693/photo/1
-
[2021-06-28 16:58:38] @ptracesecurity MalwareBazaar Database https://bazaar.abuse.ch/sample/afb5cbe324865253c7a9dcadbe66c66746ea360f0cd184a2f4e1bbf104533ccd/ #Pentesting #MalwareBazaar #Database #CyberSecurity #Infosec https://twitter.com/ptracesecurity/status/1409451164987539457/photo/1
-
[2021-06-28 03:00:55] @ffforward Both DLL and EXE shares a few genes with #BuerLoader according to @IntezerLabs but not enough to call it I believe. XLSM: https://bazaar.abuse.ch/sample/a8f8f28026bd423562cfdd1ffe100f947e69a477c4dc6bfa1d27826c6795f472/ DLL: https://bazaar.abuse.ch/sample/dc8c2d326143ff4334a7bdbafcb821ee9a525eb3248e676e4940baab8d0626a9/ EXE⬇️ https://urlhaus.abuse.ch/url/1404905/ EXE https://bazaar.abuse.ch/sample/afb5cbe324865253c7a9dcadbe66c66746ea360f0cd184a2f4e1bbf104533ccd/ cc @James_inthe_box @VK_Intel
-
[2021-06-27 18:43:19] @fr0s7_ @500mk500 #AutoIT https://www.virustotal.com/gui/file/0f119417fc9744b20377b61af49c9391531010f3791bdb7bbf56cd686883003b/relations
-
[2021-06-26 04:56:55] @r3dbU7z 2MOAR screenshots! Sample bot.x86 on VT -> https://www.virustotal.com/gui/file/5cee0abbfccdacd9bc5d68b5a340c071e2bf9f9121ef1fc80908b45e65cb205b/detection and bazaar -> https://bazaar.abuse.ch/sample/5cee0abbfccdacd9bc5d68b5a340c071e2bf9f9121ef1fc80908b45e65cb205b/ IP relations on VT -> 1 https://www.virustotal.com/gui/ip-address/194.233.162.215/relations 2 https://www.virustotal.com/gui/ip-address/170.187.225.184/relations https://twitter.com/r3dbU7z/status/1408544763268284417/photo/1
-
[2021-06-24 00:38:23] @InQuest More recent #Dridex leveraging the @PwCUS coercive lure. Wild Chr obfuscation techniques. @James_inthe_box @jcarndt @dmoore21 https://labs.inquest.net/dfi/sha256/1a520254a167eb2bbf84c8b70d466ed6e868198ed4d394c269ad7653f909017c https://twitter.com/InQuest/status/1407754923576631296/photo/1
-
[2021-06-23 08:34:56] @EmotetIndian #hancitor #DLL: 14bbf0177f897128785671f1462c09b5c24774805a554ac244666db138b36a1c https://bazaar.abuse.ch/sample/14bbf0177f897128785671f1462c09b5c24774805a554ac244666db138b36a1c/
-
[2021-06-22 14:25:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 64 VirusTotal: https://www.virustotal.com/gui/file/7929ec37a8fa469721481335d5e721c7269ce559022479e9cc54bbf0069f6daa/detection/f-7929ec37a8fa469721481335d5e721c7269ce559022479e9cc54bbf0069f6daa-1592872076 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-22 05:34:45] @InQuest ???? Malicious file found hosted at: https///github.com/Hardi-St/MobaLedLib_Docu/raw/master/Betatest/MobaLedLib-master.zip SHA256: 6dcc812226ad270cf6eb6b747707b0ac2f76ef63794ede6f10b72adbbf7527da IOC extracted from sample: https://labs.inquest.net/dfi/hash/8dd984f022a1b45b874e3a49cabe7a22ad887020db7625815b65f447538a1c3f
-
[2021-06-21 23:37:48] @ps66uk "IOM NEW PO#4600558577_EVERSAFE" EML > 1drv > ACE > #agenttesla eba9fce43daa2912230dcf4c50f286818bbb4166f0fd671c648f143a676b405c smtp:[email protected] https://app.any.run/tasks/f6843e1a-4a8b-431c-9c4d-9d36d72ffec4 https://tria.ge/210621-bbf45j3hy2
-
[2021-06-21 05:20:23] @jjrruiz @easyhostIN Proofs of #fraudulent activities: * http://virustotal.com/gui/url/67ca2846a64af999652e6024bbceeb5adb46c879c7f8bbf22813765fda26eef4/detection * http://virustotal.com/gui/url/82e61f8158fca9d0ca81c5d93f6e165d6247f9aedad8f2ddf834afc6ea57b855/detection * http://virustotal.com/gui/url/7b2c73e177653b4dc35fc58dca0b340f71a3d20b4db0718b0ac628a54e9c8457/detection
-
[2021-06-20 13:35:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 62 VirusTotal: https://www.virustotal.com/gui/file/b30a9457d46bbfb8ab98c3108fd804049fd8612cb0e92d2ad6108f3ea5f2ed2d/detection/f-b30a9457d46bbfb8ab98c3108fd804049fd8612cb0e92d2ad6108f3ea5f2ed2d-1611748511 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-17 13:45:01] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 64 VirusTotal: https://www.virustotal.com/gui/file/4ffce411f462670df9a7d95579bbf1fab89df79e1548bfc21f974ee1721b0432/detection/f-4ffce411f462670df9a7d95579bbf1fab89df79e1548bfc21f974ee1721b0432-1611018533 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-10 17:43:21] @01_security_01 VirusTotal https://www.virustotal.com/gui/file/c2ec207c5e621313a3895b5f2b09c913056ca3f599c601e01d99aedabbfd4703/details
-
[2021-06-10 16:10:34] @Kangxiaopao #JCrypt #ransomware ext:jcrypt mail:[email protected] sample: https://www.virustotal.com/gui/file/c2ec207c5e621313a3895b5f2b09c913056ca3f599c601e01d99aedabbfd4703/details https://twitter.com/Kangxiaopao/status/1402916087528714243/photo/1
-
[2021-06-09 22:05:41] @InQuest ???? Malicious RTF document found hosted at: http///bit.do/fQ2h9 SHA256: fb4a34f4bb83efa9a90ea6b5f95cac1d97b0c6554d2971b803ede572b2045846 IOC extracted from sample: https://labs.inquest.net/dfi/hash/ab60291dcde454d4c69bbfe9c0de4cc743addff3f2a1c114e4933ac2527c4ce6
-
[2021-06-09 21:51:40] @James_inthe_box dll hash: 83409f0bbfb014436c65a34cde617b515838112080afb792160c388156a63077
-
[2021-06-09 13:01:51] @InQuest ???? Malicious RTF document found hosted at: http///bit.do/fQZT3 SHA256: c3356c197595ae6fafcb37cd69e6b190fda49d4aad950f39912ee282a175d3e8 IOC extracted from sample: https://labs.inquest.net/dfi/hash/bff8febaebe956e930ffde7e65d4032ce35c6941f0a81f3dae6514f209b56bbf
-
[2021-06-06 19:25:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 63 VirusTotal: https://www.virustotal.com/gui/file/a52f874a021830d68eeb9ef64eb636739e30211a0e2bbf2f9d0757a6c5645caa/detection/f-a52f874a021830d68eeb9ef64eb636739e30211a0e2bbf2f9d0757a6c5645caa-1581539158 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-04 23:45:57] @micham Not sure what this site is about (and I don't care anymore) but I accidentally came across their backup of 552 folders. dating back to Sep 2019.???? https://www.virustotal.com/gui/url/b335bd63a3c0f385a44ab8bbf509154c957f2d4c871265c7505510ea6ba62a33/detection https://twitter.com/micham/status/1400856358157623299/photo/1
-
[2021-06-04 21:14:50] @InQuest ???? Malicious RTF document found hosted at: http///bit.do/fQWAj SHA256: 09627f9ceb7fa0fe8187c53ab675e18b20fbbf23f088bb9caaff7727b19b938b IOC extracted from sample: https://labs.inquest.net/dfi/hash/c6354273980658e3a9973b5458893e925f8762b5b3b19a2b520d6ce005953d0b
-
[2021-06-03 19:25:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 54 VirusTotal: https://www.virustotal.com/gui/file/2af839f4fabd04934969db5e76504f54be121a486f187c9b8f8b377351bd0bbf/detection/f-2af839f4fabd04934969db5e76504f54be121a486f187c9b8f8b377351bd0bbf-1538978360 Threat: Ransom:Win32/WannaCrypt.A!rsm (Microsoft)
-
[2021-06-02 21:15:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 64 VirusTotal: https://www.virustotal.com/gui/file/255c5abb46ff20be1722672e998182953ef10dce08d4c7b24f8f07be080c7bbf/detection/f-255c5abb46ff20be1722672e998182953ef10dce08d4c7b24f8f07be080c7bbf-1611458623 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
[2021-06-01 22:59:53] @InQuest ???? Malicious RTF document found hosted at: http///37.120.206.70/Mikky/m.wbk SHA256: a8fba3802e1608bd10aa341efac85054a4f3f68740772e425601327b6e915823 IOC extracted from sample: https://labs.inquest.net/dfi/hash/db7807a7e50e81f7920830593f395de5dd4230a3df15f4da683ae0ba7c6b4bbf
-
[2021-05-28 21:50:02] @HeliosCert @HeliosCert Sample analysed on #virustotal VirusTotal-Score: 64 VirusTotal: https://www.virustotal.com/gui/file/ff453f5c32018b6168a50594900ebbf82e04b83dafa7ebc4993fd941c032471a/detection/f-ff453f5c32018b6168a50594900ebbf82e04b83dafa7ebc4993fd941c032471a-1604133129 Threat: Ransom_WCRY.SMALYM (TrendMicro)
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터