top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
BlackMoon
AV: 31%
VF.dll
2024-07-05 07:59:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
Bdaejec, Sality
AV: 100%
a4).exe
2024-07-05 07:59:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
Bdaejec, Sality
AV: 100%
1.0.0.2.exe
2024-07-05 07:59:06 +02:00
Info
Class
Malicious
  • Yara
  • Snort
ViKing-R2.exe
2024-07-05 07:58:09 +02:00
Info
Class
Malicious
HTMLPhisher
AV: 0%
no Icon
PAYMENT INV-132_71.html
2024-07-05 07:57:22 +02:00
Info
Class
Clean
Priv_Kamrul Hasan invited you to access applications within their organization.msg
2024-07-05 07:54:11 +02:00
Info
Incomplete analysis
AV: None
http://moelisaustralia.onmicrosoft.com/
2024-07-05 07:54:11 +02:00
Info
Clean
https://invitations.microsoft.com/Content/Images/PixelWarning.png
2024-07-05 07:54:11 +02:00
Info
Clean
https://aka.ms/LearnAboutSenderIdentification
2024-07-05 07:54:11 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Snort
AgentTesla, PureLog Stealer
AV: 48%
Doc6078451035.exe
2024-07-05 07:47:04 +02:00
Info
Class
Clean
V5VGF7qJK1.exe
2024-07-05 07:42:42 +02:00
Info
Malicious
  • Sigma
stopka2017.exe
2024-07-05 07:36:12 +02:00
Info
Incomplete analysis
http://onpagvus.store
2024-07-05 07:35:00 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Snort
GhostRat
AV: 60%
2IVWAPeiZm.exe
2024-07-05 07:32:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 84%
DVycy79WuR.js
2024-07-05 07:16:04 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
GuLoader, Nanocore
AV: 54%
Certificate·pdf.exe
2024-07-05 07:15:14 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 47%
IMG 003.exe
2024-07-05 07:15:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AgentTesla
AV: 68%
DHL ESTADO DE CUENTA - 7664557687757.xlam.xlsx
2024-07-05 07:15:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
HTMLPhisher
AV: 49%
xJvN1QBl91.rtf
2024-07-05 07:12:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
Remcos, GuLoader
AV: 38%
PAYMENT - STATEMENT ADVISE.vbs
2024-07-05 07:12:08 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column