top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
https://divine-queen-0033.sumclennan1.workers.dev
2024-10-30 12:56:26 +01:00
No classification & info
no
Graph
Clean
X.exe
2024-10-30 12:52:06 +01:00
Info
Clean
adaFirmar.exe
2024-10-30 12:49:55 +01:00
Info
Malicious
  • Yara
  • Suricata
FormBook, GuLoader
AV: 16%
Micra.exe
2024-10-30 12:39:05 +01:00
Info
Class
Clean
https://research-clever.q-one.tech/survey/WIHe8upJ2yy9
2024-10-30 12:38:15 +01:00
Info
Malicious
  • Yara
  • Sigma
Blank Grabber, Umbral Stealer
AV: 96%
wKj1CBkbos.exe
2024-10-30 12:36:09 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-30 12:35:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 96%
file.exe
2024-10-30 12:35:09 +01:00
Info
Class
Suspicious
  • Sigma
f01bb1f6-9850-8a81-0cf8-c58347364ea7.eml
2024-10-30 12:28:59 +01:00
Info
Malicious
AV: None
https://storage.googleapis.com/inbound-mail-attachments-prod/5e015eec-2063-4653-b543-a2fdc4c2725e?GoogleAccessId=distribution-controller-prod@inbound-mail-attachments.iam.gserviceaccount.com&Expires=1761388993&Signature=Oqe%2BJFHcrdG7YCkrE3C6Zz6OLCYLhBuVvPPylkjCYGmey41qx66XjqVVSGCLAMzo5SzdjLX9iaWGDKggE5%2BSVyTp%2B4Pp9hiCYEhCbzJzRObttu74xvBHPG1HUvGwyhKfE3KbJMo6s3eIKayqjRRl9ive1ntsdNaFkXskMlbkDDitCjrgmc09BMh3GNgCZmS%2B%2F6W4Hs1%2FBX1s3JEpbIGaBotrI7KKcK%2Bk0eqEvy1FwgCCaSUDTZl1b6RyonBWqWQVoOT9UDFVSH5CfVKF4DfFfka0acdeYb2Y34WyRy8cCZlWDImJo52Hcg2wugU%2BJragJQbGJ2SdK6G4yy3Ak%2BGX%2FQ%3D%3D
2024-10-30 12:28:59 +01:00
Info
Class
Malicious
AV: None
https://storage.googleapis.com/inbound-mail-attachments-prod/e5020188-2749-47cf-83bf-a0b2cfddec50?GoogleAccessId=distribution-controller-prod@inbound-mail-attachments.iam.gserviceaccount.com&Expires=1761388993&Signature=IYvTnHOaJB29ajuWwRzQZcQU4rHZgE4%2B0wJhDBuFNmuqKnq%2FuPwCZP2MuJNgfzc77Ulb%2FJD3hwjlmSZShLzm0rPz6kKzhOLxOsUrI2XaeGtr6VKv39d0yW57ZIaLvLuZqvMWrfmHg%2BzUtv%2BcuDdwfra8VzLrHRqbhPzwLmtaXc5jZiVHr4MEAQCaBOGAv%2B6DE6yQ7c%2FlukBVx7jSavZDJXhjDk6sOF%2BQSM%2FK%2FuwwWji%2BW4LjRMFJenK4rl5ERz3yHGgV62NnKzG9uQEgFU1Iv%2B0bvdTtYnW7CWjAkQzlPAI6yDTeVaqoZiiX%2FlEIegTw1eda8%2FOtpMB8OmgtqhxecQ%3D%3D
2024-10-30 12:28:59 +01:00
Info
Class
Clean
https://static.wixstatic.com/media/d281d4_bed9b68077fc4a25897b94bb855c4caa~mv2.jpg
2024-10-30 12:28:59 +01:00
Info
Malicious
  • Sigma
AV: 62%
SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe
2024-10-30 12:24:12 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LiteHTTP Bot
AV: 68%
3u8A2xjbBT.exe
2024-10-30 12:21:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
XWorm
AV: 81%
9RgE5uOJwX.exe
2024-10-30 12:21:04 +01:00
Info
Class
Suspicious
http://cnil@infopro-digital.com/?subject=G%C3%A9rer%20mes%20donn%C3%A9es%20personnelles%20%E2%80%93%20Infopro%20Data%20%20%E2%80%93%20Salesforce
2024-10-30 12:19:48 +01:00
Info
Malicious
HTMLPhisher
AV: None
401K .pdf
2024-10-30 12:18:09 +01:00
Info
Class
Malicious
AV: 41%
no Icon
la.bot.mips.elf
2024-10-30 12:17:06 +01:00
Info
Clean
http://bravecourses.circle.so
2024-10-30 12:16:43 +01:00
Info
Suspicious
http://prhofame.pt
2024-10-30 12:13:37 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column