Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-09-27 18:17:45

expired found date

-

created at

2024-06-10 21:33:25

updated at

2026-01-10 22:38:31

Domain name statistics

length

15

crc

40919

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

112555883 (ahnlab.com)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

128703

mp size raw text

3500

mp inner links count

0

mp inner links status

20 (imported)

Open Graph

title

ASEC BLOG - AhnLab

description

AhnLab Security Emergency response Center

image

site name

ASEC BLOG

author

updated

2025-12-23 08:01:33

raw text

ASEC BLOG - AhnLab Malware Information AhnLab Detection Statistics Response Guide AhnLab CoinMiner Distribution Process within Infiltrated Systems (Detected by EDR) Posted By eastston , September 25, 2023 AhnLab Security Emergency Response Center (ASEC) has identified the process through which threat actors install CoinMiners, which utilize a compromised system’s resources for cryptocurrency mining. This post will cover how the AhnLab EDR product detects the installation process of CoinMiners that use system resources for cryptocurrency mining. Figure 1. Execution of command from threat actor   Figure 1 shows that the threat actor used the same command consistently on the infiltrated system. It shows a PowerShell script was detected being… Malicious LNK File Being Distributed, Impersonating the National Tax Service Posted By gygy0101 , September 21, 2023 AhnLab Security Emergency response Center (ASEC) has discovered circumstances of a ...

Text analysis

redirect type

31 (document.location)

block type

0 (no issues)

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

2754

text words

499

text unique words

240

text lines

48

text sentences

18

text paragraphs

5

text words per sentence

27

text matched phrases

7

text matched dictionaries

7

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

34 (reserved: import paused pending content quality/relevance assessment after importing first 500 pages)

sitemap review version

2

sitemap urls count

6280

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

3

sitemap found date

2023-12-26 11:22:18

sitemap process date

2025-02-08 06:48:55

sitemap first import date

-

sitemap last import date

2025-03-22 20:36:14