top title background image
Malware  Trends
flash
Not found what you are looking for? Try:  Advanced Search

(limited to max. 20 search results)


Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla, XWorm
AV: 58%
Ref#5010038.exe
2025-01-28 12:34:24 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 31%
rZqmN4mRco.ps1
2025-01-28 12:22:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 84%
qlGJTKUY7O.exe
2025-01-27 19:46:11 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 84%
011K3SJvSf.exe
2025-01-27 19:46:11 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 79%
uPt3XcHAIA.exe
2025-01-27 19:46:10 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 13%
176.113.115_2.225.ps1
2025-01-27 15:57:06 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 79%
hWvc9C2A4e.exe
2025-01-27 08:57:10 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 52%
KFPYr6f43H.exe
2025-01-26 15:27:19 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 76%
tZZIAvJ2Tf.exe
2025-01-26 15:23:10 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 71%
Fatality.exe
2025-01-26 15:18:11 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 13%
b.ps1
2025-01-26 10:33:07 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
XWorm
AV: 82%
mReMEAkPcw.exe
2025-01-25 17:03:12 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 13%
Wn0FGQ53RW.ps1
2025-01-25 10:37:10 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 8%
b.ps1
2025-01-25 10:25:06 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 11%
92.255.57.155.ps1
2025-01-24 10:21:04 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
XWorm
AV: 82%
XClient.exe
2025-01-24 08:06:11 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
XWorm
AV: 84%
1737701404d7e2db9bd85949651d771cf2c71b35c7c53a8031379846bc9bf607c745814b60686.dat-decoded.exe
2025-01-24 07:51:22 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
XWorm
AV: 84%
1737701404df2e7c825ea690fee7791c11c4d92b123d433c354b4b740f5cc170482f95f759630.dat-decoded.exe
2025-01-24 07:51:18 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
XWorm
AV: 84%
17377014056a69536ab12b0f859a66de89b12706e344abb5fe3544307ca437beeb04f04531790.dat-decoded.exe
2025-01-24 07:51:17 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
XWorm
AV: 84%
1737701404fa7085385bfb79cbd0d6f35547f75f57270f2f6ee97e206b79cdebcd0ddf2d49957.dat-decoded.exe
2025-01-24 07:51:11 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column