top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
Gafgyt, Mirai, Okiru
AV: 42%
no Icon
jwwofba5.elf
2024-10-29 15:53:15 +01:00
Info
Class
Malicious
  • Yara
Mirai, Okiru
AV: 42%
no Icon
qkbfi86.elf
2024-10-29 15:53:12 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 66%
no Icon
spc.elf
2024-10-29 15:53:12 +01:00
Info
Class
Malicious
  • Suricata
AV: 50%
no Icon
arm7.elf
2024-10-29 15:53:12 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai
AV: 45%
no Icon
gppc.elf
2024-10-29 15:53:08 +01:00
Info
Class
Clean
https://u7990385.ct.sendgrid.net/ls/click?upn=u001.oZ6GXC16Ztdw1ob-2F3C5yow-2FsK2YC4S8s269h9OLgp-2FGcQesCtXDXKgCEAF90Sa3OQINpMsGnptfyWHax5nVOtMIVqC-2F8evbj9lZePb3GoWyxJODFZYO-2BP5aLLWG2Kx2A-2BtoAOfeOBXubPnIrwGfx6NyiqorFpwd4yNcU9-2BTLFKpEav1PXbe-2B2gjMoJAp-2FAhoUBn5rsEZLMV8ts5LPJU-2BkEdBlR67HRvbJusJ3gkWosWVN6hbNvBBPolAcaWzCtEBnP4m_0T32ClFdYnPySZLQz4syRv4NrLn7hEzf9XOHya3KN8KgFk2GDNtBLcOsynXmj2su4Q2o4kHdNWAGV0gMmA-2FBuXvE0kejdCZwrFzTk0AyBiOwTvVGCpt7s6qA9BYMa-2Bv6t72pZeOnjrPrjPJErZlLVhc5EPEMCjDuqq-2FF5o6Lpym9-2Fn12tZP7vfN1aS5VUnbpzbFjluOg1Qs2kFXWFgQK4GBJdmP6jj9QfWzAgukSongxedoUrnvfZl7pjnFCQi4fWCrV1A3DuAT2ZLy-2BQ8BITGg2de6CTLIaCCtjDKhBjhHHdlVa2ZGZLqRTXt-2Bth5h4zR8AEInYM7uVfJNKEtaxGyFTZ3kjr-2FYMRp8QoU9XqFfhYZjQ3OoYmSqhsT2NVT6vKbsrdYITogQp2qnGlHhiGb-2BUEG5w9VqeIggSh3uGwxhx8zSzxhepzToQ5ZYEvvcJwJgUxTg0ThMfdJGVHiYhHRd8S1nshj0dhKx937CaltamgqBQwr6zfjhsRSIJ-2FqpXZpwgQuwg2efkcfehaH2ceWAuCeJ6uC26Mm-2BlD-2FH3SiifgxELbztVXaBCCHp-2FU6FYfa8T2-2F89EpP3mK9nTg-2FlxqVpjmlrGDFsSmU2paI6eLtd4i7P3ZRw4j9ZvQcBrYOsLTqDpR819vkS05xD-2Foj-2BsMWmi3Wp0A6F-2ByaBgazVb-2BOmYV1WV-2BMZSEWuiZXEwKAwIRnvwdmq1nGXhlp2Nq8AvuwPNwnqRKA9UTpkN8-2FFVKxosEhf9Zk9a0KV-2FQ-2BEBKW2219iEGtlgQn30ayl0RfWILzyAleORSAjuwIvMf6-2BILNfW6o5JwVLjtvRADxCasPgpzzFCb7-2FaiixiURSBj1Ng6Pw4PB5e4SMJH4HXRR-2FnmL9vgnwyRFnHUK7ch3163H-2Fm-2Bur2AT4EpIg6LDmY165yQNiwBNcENAyvZccvRT5Ea6SzQgcSohEfbhiwNnqOF3uj-2BAM2SY0hPmy00dDAmCCwg-3D-3D__;!!DBRq3IFYHOmqRdv5!YUaokwic__Rnmdg3RF1lALp1vPqCGmRN-wLWoJZ3JBHatqzotbbZ1gLTvM59cQWMDL9v-MPS5wkP-sqbPalGoMbV8aukgw$
2024-10-29 15:52:31 +01:00
Info
Suspicious
https://hubs.ly/Q02W5xMB0
2024-10-29 15:52:18 +01:00
No classification & info
no
Graph
Incomplete analysis
AV: None
http://app.renovaserv.bio
2024-10-29 15:51:47 +01:00
Info
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-29 15:51:05 +01:00
Info
Class
Clean
https://sourceforge.net/projects/grinder/files/The%20Grinder%203/3.11/
2024-10-29 15:47:48 +01:00
Info
Incomplete analysis
AV: None
http://renovaserv.bio
2024-10-29 15:41:13 +01:00
Info
Clean
https://www.litebee.com/product/liteBeeWingFm/
2024-10-29 15:36:55 +01:00
No classification & info
no
Graph
Clean
https://www.lodop.net/
2024-10-29 15:36:41 +01:00
Info
Clean
https://ofu.blob.core.windows.net/ofu/f.html?f_pp=esosolutions
2024-10-29 15:36:12 +01:00
Info
Suspicious
  • Yara
  • Sigma
SecuriteInfo.com.Adware.Elemental.22.22509.21519.exe
2024-10-29 15:36:05 +01:00
Info
Class
Clean
example@email.com.pdf
2024-10-29 15:35:52 +01:00
Info
Malicious
AV: None
no Icon
securedoc_20241028T070148.html
2024-10-29 15:35:15 +01:00
Info
Class
Clean
lnv_20422206_Denverwater.pdf
2024-10-29 15:35:15 +01:00
Info
Clean
hdI44WsQzp
2024-10-29 15:31:39 +01:00
Info
Clean
bad2.exe
2024-10-29 15:28:12 +01:00
No classification & info
no
Graph
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column