top title background image
Malware  Trends
You may not view this entry!
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
Mirai
AV: 42%
no Icon
vwkjebwi686.elf
2024-11-22 01:57:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
Strela Downloader
AV: 18%
6042109671038401.js
2024-11-22 01:54:07 +01:00
Info
Class
Malicious
AV: 39%
no Icon
la.bot.arm5.elf
2024-11-22 01:47:09 +01:00
Info
Malicious
  • Yara
Mirai
AV: 53%
no Icon
jwwofba5.elf
2024-11-22 01:47:04 +01:00
Info
Class
Malicious
88a4dd8-Contract Agreement-Final378208743.pdf
2024-11-22 01:43:27 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 39%
no Icon
vqsjh4.elf
2024-11-22 01:42:06 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 53%
no Icon
kjsusa6.elf
2024-11-22 01:42:06 +01:00
Info
Class
Malicious
754619b-Contract Agreement-Final727916073.pdf
2024-11-22 01:37:35 +01:00
Info
Class
Malicious
  • Yara
AV: 42%
no Icon
Mozi.m.elf
2024-11-22 01:37:03 +01:00
Info
Malicious
  • Yara
  • Sigma
ScreenConnect Tool
AV: 26%
2024-11 eStmt 5563019.exe
2024-11-22 01:33:36 +01:00
Info
Class
Clean
  • Sigma
  • Suricata
HOLT EXPERIMENTAL_07710714-20241025.xlsx
2024-11-22 01:27:03 +01:00
Info
Clean
https://www.amazon.com/gp/f.html?C=3EZOZG4B143JS&K=1E6K7EDNZJ01O&M=urn:rtn:msg:2024112123575784a68d3791734d57aa59c8099480p0na&R=1X9F7V8OBK7Z1&T=C&U=https%3A%2F%2Fbusiness.amazon.com%2Fabredir%2Fspr%2Freturns%2Fprep%3FcontractId%3D6a0575f9-ef14-43ae-afac-f5063d154a1e%26rmaId%3DDxDwhwGcRRMA%26orderId%3D111-7310600-6665801%26ingress%3Dprep_email%26ref_%3Dpe_114046300_987354350_OD0201BT_E_PREPRefundConfirmation_PREP_St&H=IA4LZ8TXHBNT2KXXSODLQKAB5OKA&ref_=pe_114046300_987354350_OD0201BT_E_PREPRefundConfirmation_PREP_St
2024-11-22 01:12:23 +01:00
No classification & info
no
Graph
Malicious
  • Yara
Mirai, Okiru
AV: 42%
no Icon
mipsel.nn.elf
2024-11-22 01:12:08 +01:00
Info
Class
Malicious
  • Yara
Mirai, Okiru
AV: 45%
no Icon
arm6.nn-20241122-0008.elf
2024-11-22 01:09:13 +01:00
Info
Class
Malicious
  • Yara
Mirai, Okiru
AV: 45%
no Icon
arm5.nn-20241122-0008.elf
2024-11-22 01:09:09 +01:00
Info
Class
Malicious
  • Yara
Mirai, Okiru
AV: 50%
no Icon
arm7.nn-20241122-0008.elf
2024-11-22 01:09:07 +01:00
Info
Class
Malicious
  • Yara
Mirai, Okiru
AV: 45%
no Icon
arm.nn-20241122-0008.elf
2024-11-22 01:09:06 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 39%
file.exe
2024-11-22 01:01:09 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 42%
file.exe
2024-11-22 01:01:09 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 33%
file.exe
2024-11-22 01:01:09 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column