top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
https://f66mv0kd.r.eu-west-1.awstrack.me/L0/https:%2F%2Fdrive.google.com%2Ffile%2Fd%2F1E4lmFGl-csyBU6z_PWZqfTFtji4q04Mh%2Fview%3Fusp=sharing/1/01020192d55b8c24-97675204-e5f2-418e-a3a9-716090b716c2-000000/GON8tjkNSJ6erX57Uvhm86QBKCA=397
2024-10-30 08:47:42 +01:00
Info
Clean
https://secure.onreg.com/onreg2/uploads/mailshots/41f956064dbd5fc4f679347126df8210.jpg
2024-10-30 08:47:42 +01:00
Info
Clean
https://all.accor.com/a/en/new-app-offer.html
2024-10-30 08:45:16 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Blank Grabber, DCRat, Umbral Stealer
AV: 92%
FixTsDfhiC.exe
2024-10-30 08:41:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla, DBatLoader, PureLog Stealer
AV: 32%
z1Transaction_ID_REF2418_cmd.bat
2024-10-30 08:34:05 +01:00
Info
Class
Clean
https://www.immoweb.be/?utm_source=crm-b2c&utm_medium=email&utm_campaign=ali_seeker_iwb_b2c_emailing_standardali_x_x_belgium_x_x_x_en_x_email_x_x&utm_content=headerimageen
2024-10-30 08:32:42 +01:00
No classification & info
no
Graph
Incomplete analysis
AV: None
http://F66MV0KD.R.EU-WEST-1.AWSTRACK.ME/L0/HTTPS:%2F%2FDRIVE.GOOGLE.COM%2FFILE%2FD%2F1UMBFOENGYZHBIPJU6E71SORQGVKWZRXE%2FVIEW%3FUSP=SHARING/1/01020192D53A859B-D3D372C7-48E6-4C37-8D55-BA0EFCC31183-000000/RXXYMX7HQ22LB6G3HIUX0HMR2QE=397
2024-10-30 08:31:33 +01:00
Info
Clean
https://4lnxbn1b.r.eu-west-1.awstrack.me/L0/https:%2F%2FWww.immoweb.be%2Fen%2Fcustomer_login.cfm%3Fredirect=emailAlert_reroute.cfm%26page=myiweb_alert.cfm%26metrics=MAIL_CLI%26idmetrics=1%26action=see%26xnum1=X_0%26xnum2=X_0%23utm_source=crm-b2c%26utm_medium=email%26utm_campaign=ali_seeker_iwb_b2c_emailing_standardali
2024-10-30 08:30:48 +01:00
No classification & info
no
Graph
Clean
no Icon
"C:\Windows\system32\wscript.exe" //e:VBScript dekstop.ini "Microsoft"
2024-10-30 08:27:57 +01:00
Info
Incomplete analysis
AV: None
http://api.mappearl.com/plg?u=570412EA-DFDE-5094-AC13-C0B5E1CAF7D3
2024-10-30 08:27:37 +01:00
Info
Clean
https://www.axessgroup.com/
2024-10-30 08:26:27 +01:00
Info
Incomplete analysis
AV: None
https://4lnxbn1b.r.eu-west-1.awstrack.me/L0/https:%2F%2FWww.immoweb.be%2Fen%2Fcustomer_login.cfm%3Fredirect=emailAlert_reroute.cfm%26page=myiweb_alert.cfm%26metrics=MAIL_CLI%26idmetrics=1%26action=see%26xnum1=X_0%26xnum2=X_0%23utm_source=crm-b2c%26utm_medium=email%26utm_campaign=ali_seeker_iwb_b2c_emailing_standardali
2024-10-30 08:25:54 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Cobalt Strike, HTMLPhisher
AV: 21%
no Icon
greatthingswithmegood.hta
2024-10-30 08:23:08 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 37%
file.exe
2024-10-30 08:21:10 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-30 08:21:07 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-30 08:21:05 +01:00
Info
Class
Clean
PO No. #0518850022790 HSP0059368 _ October 30th 2024.pdf.bz
2024-10-30 08:20:06 +01:00
No classification & info
no
Graph
Clean
https://u25608997.ct.sendgrid.net/ls/click?upn=u001.CrUrehIev9dAOd9CS5Llco2cDY-2F0Vl8esS70eJvDaxSg8VYinrpS6X-2BvAPEWs0epQPRiddUAK0QuLFe38RUlKNu-2BGZfEN-2BQQNWIHvVPkXT-2BACeIrUuopLSBumrrPWjXWLDmSJrGjI7Ag9C6QvPwiYBAEZ3knIjhwhPvd63LnyVLDCjma4-2Ffi8nW9mmdSbM4uftcIdWBqY0OwDCU7eHsSLg-3D-3DxQu5_2c6eMKqg4S33ZC0ju0w2uumiPZW7NjOPv0O9jxB1WazmjCBRcRqiY-2BFRHDITbqrOVfb2h2m0lq0OSg35PZ3Ke9OCdweitc7xsFaRyemv4z28VJnM59rP9qk1ZxjAQFpOEaWojVL9Fqcsx4rf5-2BvLvMkajc5FWvu5uFZIxDjRggv-2FLNx8nahTjeypLKPMxSjjB0YPayj78NIjLmJluZvNJH3omijA85YUq7ii0vgFSjmm0Yxj5z0PYO0VKPRtIsHdudOGbfJPQJJOAzWtJQ2YjlNHnjPuquhNQPWiJLwEhuFNIgRKR4QzQPnFzBrZ9RnhrH7Gjn-2FFLnQZ9hhs2R-2FxB1N2DdN1oajTN9IO096yt8rl4YZOoPO2PnQHjBEh2MwjyRw0d4TlcKpyInACAGniwvriiSk1OqEn-2BdlscEdcZefa4F71jVjC6JQhCfwlcmryT8en185JurxEIct8FhX-2Fi7quooOpHsmurIwesUUvmqSibHT-2F5DLkmyYzy-2BvKyFMexZEPzE5shdgicQ33HKqOnrD1j1nnajyh-2BtzLlZ9pGY-2FCJGl4EGLJclzpx8OiQ-2FQJLpbM5IhdKDIvB38-2F5Nrhw5yzaASi-2FtiS2v5GdzTwCzi-2BKktl7biCBk99LkHXJmATpwLGGchi-2Fbqf6fr29bCZLjMHgD9YbQSPWGIaqCuC9grKEViZVpoxYDebsattkki3hxLzto5PSt3IBf0nr1dEX-2BTYys1Ljo29A6wyt0y0rwZ7ZdzECwn3gZEmGKDYEFiFPHr6E91-2BKWqHCHoZc7Mdt96LopUT3wRqeiASeA8bNyemzAKOK9vgEFd3Hj6S0QP1duCsekTQfIAjrLhSUVgw3gLNMBE4kQTxBBLfBBALiTEEtq4A0ddRTSaFkL7zRYg3inrZeWeFtQXyBhjMErnD-2BlN1iCFGEQQKF-2BfJCGa3VTjj6ruyudaKWEofAB12bUrx97x7XfMdBG-2But98Hpr7l6lT60hCmNiKHf-2Bc8ijKRPAFPxKMNeCJGZdbKWLxbIS5I2fM4nu9jGNcucvwAz7bDPI7glQLLB6F3M7QvurrlLRo-3D
2024-10-30 08:13:14 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
WhiteSnake Stealer
AV: 39%
file.exe
2024-10-30 08:10:07 +01:00
Info
Class
Malicious
AV: None
no Icon
Reff_Yazaki-europe_575810710108_ZnjKTIejsM.html
2024-10-30 08:09:27 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column