top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Sigma
AV: 34%
minecraft.exe
2024-10-29 19:49:10 +01:00
Info
Malicious
  • Yara
HTMLPhisher
AV: None
https://7654658765888767.azurefd.net/mt92C
2024-10-29 19:43:43 +01:00
Info
Class
Malicious
AV: None
https://forthedoglover.com/Ray-verify.html
2024-10-29 19:42:41 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-29 19:40:14 +01:00
Info
Class
Clean
ATT00004.zip
2024-10-29 19:34:38 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
ScreenConnect Tool
AV: 4%
https://cp9856.chelokipotlester.icu/Bin/support.Client.exe?h=cp3back96.site&p=8041&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2F0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2FZuAUNQxVB6zV6MkV%2FQ3PQ8O4IKEUzM%2B1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2FCUtP6CZ%2F6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2B48fuhT%2FYi9ukTBmorR&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&i=Untitled%20Session&e=Support&y=Guest&r=
2024-10-29 19:33:34 +01:00
Info
Class
Incomplete analysis
AV: None
https://ehrapps.usda.gov/performance&data=05%7C02%7Cjohn.owen@usda.gov%7C7b15d7906c494233b13008dcf1f32c62%7Ced5b36e701ee4ebc867ee03cfa0d4697%7C1%7C0%7C638651273935876918%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=%7C0%7C%7C%7C&sdata=ucwNusNxT0FT0BBxJxHEJjSjjMYKtKrH/LUXaiMXVvw=&reserved=0
2024-10-29 19:32:19 +01:00
Info
Malicious
  • Yara
AV: None
https://massgrave.dev/get
2024-10-29 19:30:15 +01:00
Info
Class
Malicious
  • Yara
FormBook
AV: 58%
SPA-198-2024.exe
2024-10-29 19:30:13 +01:00
Info
Class
Suspicious
https://alie.kr/8IuPro4
2024-10-29 19:29:18 +01:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer
AV: 53%
MUM - VESSEL'S PARTICULARS.pdf.exe
2024-10-29 19:27:12 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
GuLoader
AV: 53%
PO-10212024168877 PNG2023-W101.exe
2024-10-29 19:26:11 +01:00
Info
Class
Suspicious
http://proftrafficcounter.com
2024-10-29 19:18:26 +01:00
Info
Suspicious
http://proftrafficcounter.com
2024-10-29 19:15:22 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, LummaC Stealer, Stealc
AV: 53%
file.exe
2024-10-29 19:14:13 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Stealc, Vidar
AV: 42%
file.exe
2024-10-29 19:14:13 +01:00
Info
Class
Malicious
  • Yara
AV: 21%
no Icon
x86_32.elf
2024-10-29 19:12:10 +01:00
Info
Clean
manifest.json
2024-10-29 19:06:40 +01:00
Info
Malicious
  • Sigma
  • Suricata
AV: 5%
burlar al diablo napoleon hill pdf.exe
2024-10-29 19:06:30 +01:00
Info
Class
Clean
http://www.expandtechpro.com
2024-10-29 19:06:02 +01:00
No classification & info
no
Graph
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column