top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
Xehook Stealer
AV: 49%
01ffe49f3718dcb41ddd63aadd76a3bd342de6f7549697033325830828bcfdf7_dump.exe
2024-05-19 11:33:08 +02:00
Info
Class
Clean
no Icon
E17B89C822EAEEB4F194B13D2471C906E926125E31D7A8F8B33298BEFB65D116
2024-05-19 11:28:56 +02:00
Info
Clean
http://www.interfactura.com/EmailTracking/redireccionador/a.aspx?IDEnvio=ab112156-0d20-467e-b040-e20eec9bf5a2&IDLiga=66f06217-f375-44e5-801a-fe4bfe232285&IDReceptor=3d4e92b1-512c-44b4-846b-8cb7146b31a9&IDValorURL=https://emc.johnnysteeledesign.com/ZIEeSceqptkZUKHrrmcKDvYNux/per$cleanenergytransition.com/RYURvNmvoEXVudzhKihtqjwGO
2024-05-19 11:19:12 +02:00
Info
Clean
https://velh.fr/
2024-05-19 11:09:03 +02:00
Info
Malicious
  • Yara
LummaC
AV: 20%
0a115cf0821cd01199c474d8b3a5211b06ee8adb894309d8110dad577e6e9117_payload.exe
2024-05-19 10:54:07 +02:00
Info
Class
Malicious
  • Yara
PureLog Stealer, zgRAT
AV: 51%
5Cap0csxHs.exe
2024-05-19 10:23:11 +02:00
Info
Class
Clean
http://healthyaging.co.il
2024-05-19 10:04:59 +02:00
Info
Malicious
https://www.trades-protection.co.uk/update/?id=senderredu&sender_campaign=dGoZr0&sender_ctype=email&sender_customer=xn0JvBl&utm_campaign=Policy+Premium+Changed&utm_medium=email&utm_source=newsletter
2024-05-19 09:40:08 +02:00
Info
Class
Malicious
https://192.243.61.227
2024-05-19 09:24:52 +02:00
Info
Clean
http://ugebrev.dk
2024-05-19 09:20:41 +02:00
Info
Malicious
  • Yara
Vidar
AV: 10%
file.exe
2024-05-19 09:08:06 +02:00
Info
Class
Clean
mojo_core.dll
2024-05-19 09:02:44 +02:00
Info
Clean
https://visitor.r20.constantcontact.com/manage/optin?v=001_PHiFcqOoa39jj7ppBPf-t4Ef5ynycO4RPqDNhkALxEBCrgP1QSRat1GHYtlFGXisX5ZicRJIqeNmGFZEW9wHhb0bF07ZW6pDO2U2mEra4Hu_a2BMyacAHtTtmFv14B577sZXAzXWBWF6N17140rhHG6J0CGJgO8XB6b9H5SeZfKT7PXgXW_bzDorugxNMuDHEPOq7PKNRPyd5KfFVoatw%3D%3D
2024-05-19 08:51:45 +02:00
Info
Clean
http://report-scam.malwarebouncer.com
2024-05-19 08:16:21 +02:00
Info
Malicious
  • Yara
no Icon
PpjdXyzx8T.elf
2024-05-19 08:04:11 +02:00
Info
Malicious
  • Yara
  • Sigma
FormBook
AV: 67%
FGGx944Qu7.exe
2024-05-19 08:04:06 +02:00
Info
Class
Malicious
no Icon
maQq7hLDd6.elf
2024-05-19 08:03:11 +02:00
Info
Malicious
  • Yara
Mirai
AV: 23%
no Icon
hO10oIWzWS.elf
2024-05-19 08:03:11 +02:00
Info
Class
Malicious
  • Yara
AV: 33%
no Icon
CAANkFE98C.elf
2024-05-19 08:03:11 +02:00
Info
Malicious
  • Yara
PureLog Stealer
AV: 1%
6Ms5Kp6Bho.exe
2024-05-19 08:00:12 +02:00
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column