top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
Stealc, Vidar
AV: 47%
file.exe
2024-10-28 14:28:06 +01:00
Info
Class
Malicious
AV: None
https://ascot.auditboardapp.com/task-redirect/4113?source=email&CTA=taskTitleLink&notificationId=044e55a3-481a-4a33-91c7-abbaf803b1d7&projectId=367&taskId=4113&notificationType=WS-task-submitted
2024-10-28 14:25:03 +01:00
Info
Class
Clean
https:/wentworth.az1.qualtrics.com/jfe/form/SV_bEnaGtb0Jw7NaWa?Q_DL=QrigjMFTYZVVTqH_bEnaGtb0Jw7NaWa_CGC_gCML4CuBSL0ABp7&Q_CHL=email
2024-10-28 14:24:38 +01:00
Info
Incomplete analysis
AV: None
http://45.17.195.156
2024-10-28 14:24:10 +01:00
Info
Malicious
  • Yara
  • Sigma
FormBook
AV: 42%
Quote35664776.exe
2024-10-28 14:24:05 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 29%
New PO 127429.exe
2024-10-28 14:23:07 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 18%
Document.exe
2024-10-28 14:23:07 +01:00
Info
Class
Clean
http://www.lexxuz.com
2024-10-28 14:21:53 +01:00
Info
Incomplete analysis
AV: None
http://com-trackehk.top
2024-10-28 14:19:20 +01:00
Info
Clean
https://www.cognitoforms.com/f/89SrSs1MAk62CkEup_jijw/1
2024-10-28 14:15:14 +01:00
No classification & info
no
Graph
Malicious
HTMLPhisher
AV: None
https://onedrive.live.com/view.aspx?resid=8656653D19C3C7C0!s553e3fe901654d86bcc4ed44c7c05dd3&migratedtospo=true&redeem=aHR0cHM6Ly8xZHJ2Lm1zL28vYy84NjU2NjUzZDE5YzNjN2MwL0V1a19QbFZsQVlaTnZNVHRSTWZBWGRNQmtvbDQ2b1NlN1o5MGFiazNzS3lGSlE_ZT1UMnQ4S3Y&wd=target%28Sezione%20senza%20titolo.one%7C8d7e5173-6006-4648-a69d-e39e66e7041a%2FAblehnung%20Rechnung%20R15946098273-KU30_WE02%20Vom%2028%5C%2F%7Cd77916b9-b471-429a-a13e-74764563e56b%2F%29&wdorigin=NavigationUrl
2024-10-28 14:11:37 +01:00
Class
no
Graph
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 37%
Export Shipment Documents 72335.exe
2024-10-28 14:11:07 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
MassLogger RAT, PureLog Stealer
AV: 42%
come.exe
2024-10-28 14:11:07 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
PureLog Stealer, Snake Keylogger
AV: 37%
INVOICE.exe
2024-10-28 14:10:06 +01:00
Info
Class
Clean
http://ngrok.ngrok-cname.com
2024-10-28 14:09:11 +01:00
Info
Malicious
  • Yara
  • Sigma
FormBook
AV: 63%
PAID CA2686+CA2687+CA2688.exe
2024-10-28 14:09:06 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC
AV: 5%
Okfjk1hs4kdhs2.exe
2024-10-28 14:06:04 +01:00
Info
Class
Clean
https://acrobat.adobe.com/id/urn:aaid:sc:EU:4ba99727-806e-403b-9057-78ef5bf9d757
2024-10-28 14:06:04 +01:00
No classification & info
no
Graph
Clean
https://hub.decipherinc.com/survey/selfserve/170c/2409156?list=1&RESPID=HEALTHINSU519270&source=AL2JJyk3iN
2024-10-28 14:05:23 +01:00
Info
Malicious
  • Suricata
HTMLPhisher, Mamba2FA
AV: None
https://fce0.com/vn%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/
2024-10-28 14:01:26 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column