top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
1000008045.mp4
2025-05-01 01:30:09 +02:00
Info
Clean
no Icon
1000008043.jpg
2025-05-01 01:29:39 +02:00
No classification & info
Malicious
  • Yara
  • Suricata
Prometei
AV: 50%
no Icon
na.elf
2025-05-01 01:28:13 +02:00
Info
Class
Clean
MaxStarter Installer-1.0.1-Win-x64.exe
2025-05-01 01:27:13 +02:00
Info
Clean
  • Suricata
https://www.figma.com/deck/MoyZ5SrXFyZkmHJEpwdxFE/KINGSWAY-GROUP-INC-RFQ?node-id=1-40&t=YIpKHoydG9CTiwJ6-0&scaling=min-zoom&content-scaling=fixed&page-id=0%3A1
2025-05-01 01:23:21 +02:00
Info
Suspicious
  • Suricata
https://www.police1.com/police-training/debunking-the-newhall-myths-why-the-truth-still-matters-for-every-officer?utm_source=delivra&utm_medium=email&utm_campaign=P1-RollCall-4-30-25&utm_id=8854003&dlv-emuid=9d6554da-1636-4de9-acab-57c458773fe3&dlv-mlid=8854003
2025-05-01 01:21:04 +02:00
Info
Class
no
Graph
Malicious
AV: None
https://email.mail-mg.roofr.com/c/eJwcy02ugyAQAODTwNLA8L9g8TbmXWNgnKLRSBTb6zfpAT7KsSZKXi5ZB-tSsuCdbNmC8VQLgLHMVXtIlhRBDUugqCHINbuEkYJXhrmWaBBTYR1UXYgNqgLCKux9us6Tr6meh9xzG6PfwvwJmAXM8Ez9I2D-RzeGvPK947Zha_gIq14HrvuPvTN8AwAA__8lxTFC
2025-05-01 01:20:48 +02:00
Info
Clean
https://techinservinc.com/?flvxujik=1bb3f0107e4cd57f1940c68a69951a541aead55351c27cf24b453c441c02233d7e513ba6227fc1f377fc1105ecdcbae687d8e6485296131bba8fe95a61588478
2025-05-01 01:19:32 +02:00
Info
Clean
https://url.au.m.mimecastprotect.com/s/eNRkC81ZjKhOzMA4c2iGfyuzQ9?domain=login.microsoftonline.com
2025-05-01 01:18:42 +02:00
Info
Suspicious
https://email.mail-mg.roofr.com/c/eJwcy02ugyAQAODTwNLA8L9g8TbmXWNgnKLRSBTb6zfpAT7KsSZKXi5ZB-tSsuCdbNmC8VQLgLHMVXtIlhRBDUugqCHINbuEkYJXhrmWaBBTYR1UXYgNqgLCKux9us6Tr6meh9xzG6PfwvwJmAXM8Ez9I2D-RzeGvPK947Zha_gIq14HrvuPvTN8AwAA__8lxTFC
2025-05-01 01:15:02 +02:00
Info
Clean
  • Sigma
  • Suricata
254 - Dock.xls
2025-05-01 01:14:32 +02:00
Info
Malicious
  • Sigma
orc.exe
2025-05-01 01:13:52 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC Stealer
AV: 28%
Yuzu Loader.exe
2025-05-01 01:06:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC Stealer
AV: 6%
Sky Loader V.3.exe
2025-05-01 01:05:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC Stealer
AV: 32%
loader.exe
2025-05-01 01:04:14 +02:00
Info
Class
Malicious
  • Sigma
  • Suricata
AV: 31%
QuantumLoader v3.56.exe
2025-05-01 01:03:14 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC Stealer
AV: 32%
Launcher.exe
2025-05-01 01:02:09 +02:00
Info
Class
Malicious
  • Sigma
  • Suricata
Bunni.exe
2025-05-01 01:01:14 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Vidar
AV: 32%
qPzStNLix.exe
2025-05-01 00:52:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Socks5Systemz
AV: 14%
UNIQTWO[1].exe
2025-05-01 00:47:10 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s) Live Interaction
Customization Show ID column