top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
LummaC
AV: 21%
1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe
2024-10-27 13:38:26 +01:00
Info
Class
Malicious
  • Yara
LummaC
AV: 24%
1730032627a344c434affaafd4d77b56c55854c12f00c450a482da7e4394bd826a11e19ee9557.dat-decoded.exe
2024-10-27 13:38:26 +01:00
Info
Class
Suspicious
173003262794649fd566ac9fa2f5c76908d8d3540e8fb3570acefd08985c49bb9528c6e5f3515.dat-decoded.exe
2024-10-27 13:38:26 +01:00
No classification & info
Malicious
  • Yara
RedLine
AV: None
17300326279186e286d8011f3b538be5fe09fea96cf622736b029b36a16f125b2e18b135f5130.dat-decoded.exe
2024-10-27 13:38:19 +01:00
Info
Class
Malicious
  • Yara
RedLine
AV: None
173003262823b6cc165a3419f0fd6ed6638587bb7a63d217987710ec1ca75bd8d0099ba446878.dat-decoded.exe
2024-10-27 13:38:19 +01:00
Class
Suspicious
1730032627852fc8a06221f40c551be41982954cbe5c8bc44bb4e58a21d3720d9073067c55723.dat-decoded.exe
2024-10-27 13:38:19 +01:00
No classification & info
Malicious
  • Yara
LummaC
AV: 21%
173003262828c2e446493e5b399a9ad32e1686ad7eda9989a2ad6f14168b61b16d6b56a7a5348.dat-decoded.exe
2024-10-27 13:38:14 +01:00
Info
Class
Malicious
  • Yara
LummaC
AV: 21%
1730032629686ce97124077b7d45db43570eb84adbe52dd3127dbe188ed703f899a75046a5154.dat-decoded.exe
2024-10-27 13:38:14 +01:00
Info
Class
Malicious
  • Yara
LummaC
AV: 24%
17300326286fc6e1e6890015b3b51edbcffbeeeb53d18d19cce1fb289d5f0a36124f682a1d474.dat-decoded.exe
2024-10-27 13:38:14 +01:00
Info
Class
Malicious
  • Yara
Blackshades
AV: None
1730032629d03288421fce5e7d9e6026f5a967d50c541a02112bcbceaac1a2fa9677728cde553.dat-decoded.exe
2024-10-27 13:38:09 +01:00
Class
Incomplete analysis
AV: None
1730032629a1045efd2ad4e4adac06966158f2f021a0f8bc87f6317324f45807d8121c0671809.dat-decoded.exe
2024-10-27 13:38:09 +01:00
No classification & info
Clean
https://triagroup.ru
2024-10-27 13:33:34 +01:00
Info
Malicious
  • Yara
RHADAMANTHYS
AV: 47%
dZIZhRHDXv.exe
2024-10-27 13:33:04 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 37%
nGmqbXROga.exe
2024-10-27 13:06:08 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-27 13:03:07 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-27 13:02:06 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker
AV: 45%
R40XD2LfcZ.exe
2024-10-27 12:59:17 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker
AV: 39%
UfRKIdsNvD.exe
2024-10-27 12:59:16 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker
AV: 24%
2QPrBtk3J8.exe
2024-10-27 12:59:15 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker, Cryptbot
AV: 18%
LkCinYWgNh.exe
2024-10-27 12:59:07 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column