top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Suricata
Stealc
AV: 51%
file.exe
2024-11-22 05:15:12 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 49%
file.exe
2024-11-22 05:15:09 +01:00
Info
Class
Malicious
AV: None
file.exe
2024-11-22 05:15:07 +01:00
Info
Class
Malicious
  • Yara
BumbleBee
AV: 13%
Acrobat_DC_x64_VIP_v10.12.msi
2024-11-22 05:02:11 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 71%
file.exe
2024-11-22 05:01:06 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker, Cryptbot
AV: 46%
file.exe
2024-11-22 04:58:09 +01:00
Info
Class
Malicious
AV: 18%
no Icon
wheiuwa4.elf
2024-11-22 04:52:04 +01:00
Info
Clean
https://www.wrike.com/form/eyJhY2NvdW50SWQiOjY2NTMyNDcsInRhc2tGb3JtSWQiOjIxNTE4ODl9CTQ4ODUxOTMwNjM4NDYJOTc4NmYyOGNlZTc2NmFhOGU1MDBiYmVmMjZjYTYyZmIzZmQ0NGNjYTY5ZjNhMzE5NTg1YjE1ZjAxNzUxYmY5NQ==
2024-11-22 04:46:12 +01:00
Info
Malicious
  • Yara
TechSupportScam
AV: None
https://365214tesauppeortbasd132.z26.web.core.windows.net/#
2024-11-22 04:42:41 +01:00
Info
Class
Clean
http://Hi%20Team,%20%20We%20have%20blocked%20the%20sender%20on%20user%20outlook.%20%20Please%20check%20the%20below%20URL%20reputation%20and%20block%20if%20required.%20And%20perform%20full%20scan%20on%20this%20john.lennie@elders.com.au%20user%20machine.%20And%20ask%20SD%20team%20to%20reset%20password%20if%20required.%20%20https://www.wrike.com/form/eyJhY2NvdW50SWQiOjY2NTMyNDcsInRhc2tGb3JtSWQiOjIxNTE4ODl9CTQ4ODUxOTMwNjM4NDYJOTc4NmYyOGNlZTc2NmFhOGU1MDBiYmVmMjZjYTYyZmIzZmQ0NGNjYTY5ZjNhMzE5NTg1YjE1ZjAxNzUxYmY5NQ==
2024-11-22 04:41:55 +01:00
Info
Clean
https://security.microsoft.com/viewalerts?id=666f3b9d-c5d4-0b2f-5800-08dcfd559561
2024-11-22 04:37:18 +01:00
Info
Malicious
http://103.212.224.14:9998/hello
2024-11-22 04:36:39 +01:00
Class
no
Graph
Malicious
http://202.175.83.249:5603/ws
2024-11-22 04:27:51 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 54%
file.exe
2024-11-22 04:26:09 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 43%
file.exe
2024-11-22 04:26:07 +01:00
Info
Class
Malicious
file.exe
2024-11-22 04:26:05 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 46%
file.exe
2024-11-22 04:25:04 +01:00
Info
Class
Malicious
  • Sigma
AV: 21%
veraport-g3-x64.exe
2024-11-22 04:17:57 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 50%
file.exe
2024-11-22 04:10:07 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 50%
no Icon
vkjqpc.elf
2024-11-22 03:57:04 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column