top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
https://url.avanan.click/v2/r01/___https://drickly-com-dot-fluid-dreamer-410607.uc.r.appspot.com/?h=66LVKOwLflbMjYVoJBNTrXiW3CEpoRg_EafL_ygpoXil&fru;v=755/8c88*~*9&fru;w=6c5ghgij98cg/ffg&fru;E=6a766/89b55*~*9&fru;t=myyue8Fe7Ke7KBBB.lttlqj.htr.xle7Kzwqe8Kxfe8Iye7*~*jxwhe8I3ZR/bSIze7*~*xtzwhje8Ie7*~*whye8I859Oe7*~*e7*~*hie8I7/*~*Ize7*~*zfhye7*~*zwqe8Ifrue7Kxe7KfwrxywtslxyjjqBtwp.htrd.fnlzD___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzo3NDhmM2FkMWRiOWU2YTNlMjE1YzgwMzRjMTliODRkZDo3OmNmNmI6NjYyMTE5OWZiNzU5MjU0NTE1ZjgzODM0ZWRlYjRmZDIwOWJmNTQ3YWUwY2MxNmU5NjFiZmExYjYzM2U0YzA0MzpoOlQ6VA#YW5nZWxhLmxhd3Nvbi1jYW1wYmVsbEBmaXJzdG9udGFyaW8uY29t
2024-11-01 19:44:23 +01:00
No classification & info
no
Graph
Malicious
  • Suricata
HTMLPhisher
AV: None
https://docsend.com/view/yvdhrcvq4c4p7xrd
2024-11-01 19:39:02 +01:00
Info
Class
Malicious
HTMLPhisher
AV: None
https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=sf_rand_string_mixed(5)FgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fir.nbaikp3.sa.com%2Fdelaw%2Flawn%2Fkoo%2Fsf_rand_string_mixed(24)/william.ferebee@steptoe-johnson.com
2024-11-01 19:27:31 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 63%
DHL_IMPORT_8236820594.exe
2024-11-01 19:26:11 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 96%
file.exe
2024-11-01 19:23:13 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 50%
Warm_UP.rtf
2024-11-01 19:23:13 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 39%
file.exe
2024-11-01 19:23:13 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 37%
Ab8me6mNQ6.exe
2024-11-01 19:21:10 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 76%
SaxP2rle4l.exe
2024-11-01 19:19:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 82%
6YbG0llASL.exe
2024-11-01 19:18:13 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 76%
2Y2u9r3RUs.exe
2024-11-01 19:18:13 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 76%
xeqHTJ1ihs.exe
2024-11-01 19:18:13 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
Xmrig
AV: 76%
fUIlRR9LxG.exe
2024-11-01 19:18:07 +01:00
Info
Class
Clean
https://tinyurl.com/2h6e36wy?mLf=PfzfltaqgO
2024-11-01 19:17:57 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 82%
FVF0A97cSE.exe
2024-11-01 19:17:17 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 76%
0ei5ozFyQ2.exe
2024-11-01 19:17:12 +01:00
Info
Class
Malicious
  • Sigma
  • Suricata
AV: 76%
OSEUvKkryV.exe
2024-11-01 19:17:12 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 76%
Ualj3B1EKo.exe
2024-11-01 19:17:11 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 76%
dbW6ETPSt2.exe
2024-11-01 19:17:06 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
Xmrig
AV: 76%
p8k1zzTYEh.exe
2024-11-01 19:16:16 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column