top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
Mirai, Okiru
AV: 46%
no Icon
e35ErlXIYh.elf
2024-07-03 07:59:11 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Mirai, Gafgyt, Okiru
AV: 47%
no Icon
xr2xnZhHkh.elf
2024-07-03 07:59:08 +02:00
Info
Class
Malicious
  • Yara
Mirai, Okiru
AV: 67%
no Icon
X1lngf4tz7.elf
2024-07-03 07:59:08 +02:00
Info
Class
Malicious
  • Yara
Mirai, Okiru
AV: 75%
no Icon
AOzjC0rWUn.elf
2024-07-03 07:59:06 +02:00
Info
Class
Incomplete analysis
AV: 0%
ImagingBase.dll
2024-07-03 07:54:05 +02:00
No classification & info
Malicious
AV: 33%
jR2YVB04Il.exe
2024-07-03 07:50:06 +02:00
No classification & info
Malicious
  • Yara
  • Sigma
LummaC, Poverty Stealer, SmokeLoader
AV: 50%
JuHVfiAuLo.exe
2024-07-03 07:50:06 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
FormBook, GuLoader
AV: 3%
birectangular.vbs
2024-07-03 07:49:05 +02:00
Info
Class
Clean
no Icon
9A - Khensu - (Pachons) 2025.docx
2024-07-03 07:48:03 +02:00
Info
Malicious
x8t38OJR0w.exe
2024-07-03 07:46:07 +02:00
No classification & info
Malicious
Iwh4ctvGK6.exe
2024-07-03 07:46:07 +02:00
No classification & info
Malicious
  • Yara
  • Sigma
LummaC, Poverty Stealer, SmokeLoader
AV: 61%
EiPVv5yELP.exe
2024-07-03 07:46:04 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
LummaC, Poverty Stealer, SmokeLoader
AV: 69%
LXbM8RbhLa.exe
2024-07-03 07:45:03 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
LummaC, Poverty Stealer, SmokeLoader
AV: 66%
6IMo1kM9CC.exe
2024-07-03 07:44:03 +02:00
Info
Class
Malicious
  • Yara
HTMLPhisher
AV: 0%
https://eastwestseed-my.sharepoint.com/:o:/p/nannaphat_phansuk/Eidgp0Qg-HFArs_bxgJSxjYBoQDW3HefgIxqLzXf3wb6MA?e=5%3aUVSLsG&at=9
2024-07-03 07:41:31 +02:00
Info
Class
Clean
9A - Khensu - (Pachons) 2025.docx
2024-07-03 07:30:00 +02:00
Info
Clean
https://www.linkedin.com/e/v2?e=-587qpq-ly5bxstv-g2&lipi=urn:li:page:email_email_second_guest_reminder_03;7Js8w1YWR7S6OHHpNBzkaQ==&t=suwj&ek=email_second_guest_reminder_03&li=0&m=hero&ts=accept_button_A1&validationToken=BgaDmzgH&invitationId=7208746412124078080
2024-07-03 07:24:58 +02:00
Info
Malicious
  • Yara
AV: 74%
4QamAQhoxB.exe
2024-07-03 07:19:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 34%
SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.12946.7200.exe
2024-07-03 07:18:05 +02:00
Info
Class
Malicious
Eclf71HXa1.exe
2024-07-03 07:14:07 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column