top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
AV: 29%
no Icon
la.bot.m68k.elf
2024-10-30 00:57:06 +01:00
Info
Clean
https://docs.google.com/forms?usp=mail_form_link
2024-10-30 00:55:48 +01:00
Info
Suspicious
https://energetic-cumquat-529599bce724.herokuapp.com/b?y=49q24eh274qj8or571h6ceb171h3acb3cpgjap9gcgp34or664sj0d1ncgh2o8ji48t24q3keho76ehf5to6us3cdliisorf5tk62sr85t63irblatnn0r1f68nmasp2
2024-10-30 00:55:13 +01:00
Class
no
Graph
Malicious
AV: 50%
no Icon
sh4.elf
2024-10-30 00:47:09 +01:00
Info
Class
Malicious
AV: 53%
no Icon
arm6.elf
2024-10-30 00:47:06 +01:00
Info
Malicious
AV: 53%
no Icon
arm.elf
2024-10-30 00:47:06 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-30 00:44:05 +01:00
Info
Class
Clean
http://www.twitter.com/brightmetrics
2024-10-30 00:41:04 +01:00
Info
Clean
https://docs.google.com/forms?usp=mail_form_link
2024-10-30 00:40:44 +01:00
Info
Clean
http://www.linkedin.com/company/brightmetrics
2024-10-30 00:40:44 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker
AV: 32%
0HUxKfIvSV.exe
2024-10-30 00:28:11 +01:00
Info
Class
Malicious
AV: None
completedfiles.....pdf
2024-10-30 00:20:56 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 59%
file.exe
2024-10-30 00:19:06 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-30 00:19:06 +01:00
Info
Class
Malicious
AV: 50%
no Icon
mips.elf
2024-10-30 00:17:09 +01:00
Info
Class
Malicious
AV: 50%
no Icon
m68k.elf
2024-10-30 00:17:04 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 58%
no Icon
arm7.elf
2024-10-30 00:12:07 +01:00
Info
Class
Malicious
AV: None
https://docs.google.com/uc?export=download&id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv
2024-10-30 00:07:30 +01:00
Info
Malicious
AV: None
https://docs.google.com/uc?export=download&id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv
2024-10-30 00:06:35 +01:00
Info
Malicious
AV: None
https://docs.google.com/uc?export=download&id=1rG5XITnDsiVQCEMAfg1Ex3pDcYxrlv0N
2024-10-30 00:05:55 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column