top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Suricata
Lokibot
AV: 97%
dw7h7aQwVZ.exe
2024-10-25 11:28:10 +02:00
Info
Class
no
Graph
Suspicious
https://ljptn9jl729v.jp.larksuite.com/share/base/form/shrjpAd28kd9HXI7TjO1wFqS7Pf
2024-10-25 11:27:20 +02:00
No classification & info
no
Graph
Malicious
AV: 29%
no Icon
la.bot.m68k.elf
2024-10-25 11:27:04 +02:00
Info
Clean
https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-brands-400.woff2
2024-10-25 11:26:09 +02:00
Info
no
Graph
Clean
https://nam.safelink.emails.azure.net/redirect/?destination=https%3A%2F%2Fadmin.microsoft.com%2Fadminportal%2Fhome%3F%23%2Fsubscriptions&p=bT00NTQ5MjI1Zi1iOGVjLTQ5MWYtODYyMy03ODE1ZmYxMjg0ZjImcz0wMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDAmdT1hZW8mbD1ob21l
2024-10-25 11:22:08 +02:00
Info
Malicious
  • Yara
  • Suricata
LummaC
AV: 47%
9FvJxhtNOD.exe
2024-10-25 11:16:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Pushdo
AV: 29%
yGktPvplJn.exe
2024-10-25 11:16:10 +02:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-25 11:16:04 +02:00
Info
Class
Malicious
AV: 39%
no Icon
la.bot.arm5.elf
2024-10-25 11:07:06 +02:00
Info
Malicious
  • Sigma
AV: 69%
G9Z66ZF3Y370FN9E.js
2024-10-25 11:05:20 +02:00
Info
Class
Malicious
AV: 32%
no Icon
la.bot.sh4.elf
2024-10-25 11:02:08 +02:00
Info
Class
Malicious
AV: 39%
no Icon
la.bot.arm.elf
2024-10-25 11:02:08 +02:00
Info
Class
Clean
http://www.tripolo.pt/
2024-10-25 11:01:08 +02:00
Info
Clean
https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-solid-900.woff2
2024-10-25 10:59:48 +02:00
No classification & info
no
Graph
Suspicious
  • Suricata
https://motorentechnik-oberberg.de/
2024-10-25 10:57:22 +02:00
Info
Class
Malicious
AV: 34%
no Icon
la.bot.sparc.elf
2024-10-25 10:57:12 +02:00
Info
Class
Malicious
AV: 37%
no Icon
la.bot.mips.elf
2024-10-25 10:57:07 +02:00
Info
Class
Clean
http://josten-tortechnik.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_v/EDdO9sm1Yy01NMJNtNxO/PmigbBFjqxGny5HBPE7q7FKT/cBYy4Q8grpaxZcszWhXc5Cd/
2024-10-25 10:55:36 +02:00
Info
Clean
Herinnering (5)_20241017163011148.pdf
2024-10-25 10:54:26 +02:00
Info
Clean
http://s.ksrndkehqnwntyxlhgto.com
2024-10-25 10:54:04 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column