top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
GuLoader
AV: 20%
99200032052824.bat.exe
2024-05-27 09:05:09 +02:00
Info
Class
Clean
April_2024.xlsx
2024-05-27 09:04:51 +02:00
No classification & info
no
Graph
Clean
ALC700V1.0.0.7a.exe
2024-05-27 09:04:14 +02:00
Info
Malicious
  • Yara
  • Snort
Gafgyt, Mirai
AV: 66%
no Icon
s0OthAxkuM.elf
2024-05-27 09:03:13 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Gafgyt, Mirai
AV: 68%
no Icon
6eYKWxlBqa.elf
2024-05-27 09:03:13 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Gafgyt, Mirai
AV: 64%
no Icon
PdZXqwmJYf.elf
2024-05-27 09:03:08 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Gafgyt, Mirai
AV: 68%
no Icon
Au4yf52Szd.elf
2024-05-27 09:03:08 +02:00
Info
Class
Malicious
  • Yara
Gafgyt, Mirai
AV: 68%
no Icon
JhemwyNPBX.elf
2024-05-27 09:03:08 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Gafgyt, Mirai
AV: 71%
no Icon
mZ2LgS47Z1.elf
2024-05-27 09:02:17 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Gafgyt, Mirai
AV: 68%
no Icon
rV97CNwo30.elf
2024-05-27 09:02:17 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Gafgyt, Mirai
AV: 67%
no Icon
4CB2w5yQL3.elf
2024-05-27 09:02:12 +02:00
Info
Class
Malicious
  • Yara
Gafgyt, Mirai
AV: 66%
no Icon
Eov3h9U733.elf
2024-05-27 09:02:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 57%
PO_27052024.exe
2024-05-27 09:00:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
Remcos
AV: 13%
Ref19920830281982938RT.xls
2024-05-27 08:59:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 55%
Reiven RFQ-27-05-2024.exe
2024-05-27 08:59:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
GuLoader, Remcos
AV: 29%
INQUIRY#46789-MAY_24_PRODUCTS.exe
2024-05-27 08:58:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 37%
Amended Order #60-230958400.exe
2024-05-27 08:58:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
FormBook
AV: 59%
Цитата.exe
2024-05-27 08:41:07 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Lokibot
AV: 71%
Purchase Inquiry_#466789.exe
2024-05-27 08:31:07 +02:00
Info
Class
Suspicious
oBX1n79NgQ.exe
2024-05-27 08:30:47 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column