top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-24 21:36:04 +02:00
Info
Class
Suspicious
https://ikrushercom-my.sharepoint.com/:f:/g/personal/matthew_bracamonte_ikrusher_com/ElnHrXHj5MFEnqF-6IvRshwBNvIQ5hsavmSFFA_CKg1Ucw?e=FIcsSY
2024-10-24 21:33:20 +02:00
Class
no
Graph
Clean
https://farmersinsurance.sharepoint.com/sites/LH-20-1335-SAEAttorney?e=1%3Aeb2f1b11709d4f2da02ee42b00eec9fc&d=DwMGaQ
2024-10-24 21:32:40 +02:00
Info
Malicious
AV: 32%
no Icon
la.bot.mipsel.elf
2024-10-24 21:32:06 +02:00
Info
Malicious
  • Yara
  • Suricata
Stealc
AV: 39%
hi2jR57Z15.exe
2024-10-24 21:31:04 +02:00
Info
Class
Malicious
AV: None
Doc-Secure6033.pdf
2024-10-24 21:30:48 +02:00
Info
Malicious
AV: 34%
no Icon
la.bot.arm6.elf
2024-10-24 21:27:08 +02:00
Info
Malicious
AV: 32%
no Icon
la.bot.mipsel.elf
2024-10-24 21:27:05 +02:00
Info
Class
Malicious
  • Sigma
AV: None
phish_alert_sp2_2.0.0.0 (1).eml
2024-10-24 21:23:29 +02:00
Class
no
Graph
Clean
text_0.txt
2024-10-24 21:22:33 +02:00
No classification & info
Malicious
  • Yara
  • Sigma
  • Suricata
Lokibot
AV: 37%
SecuriteInfo.com.W97M.DownLoader.6515.29545.30613.xlsx
2024-10-24 21:18:09 +02:00
Info
Class
Malicious
  • Sigma
  • Suricata
AV: 46%
SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx
2024-10-24 21:18:06 +02:00
Info
Malicious
AV: None
no Icon
la.bot.arm5.elf
2024-10-24 21:12:07 +02:00
Info
Malicious
AV: None
https://view.flodesk.com/emails/671a6d1f7ce9f793bb70518a
2024-10-24 21:11:11 +02:00
Class
no
Graph
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 0%
file.exe
2024-10-24 21:11:06 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-24 21:10:05 +02:00
Info
Class
Clean
https://cernercentral.com/device-access/tenants/2b53e1a6-a4f0-4eb4-9db6-d7bb72f1c188/user/access-codes/c79d33bf-b84f-4417-a3c5-26de96bde6a6?realmId=2b53e1a6-a4f0-4eb4-9db6-d7bb72f1c188
2024-10-24 21:04:43 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
  • Suricata
Spark RAT
AV: None
msoia.exe
2024-10-24 21:04:07 +02:00
Info
Class
Malicious
AV: 34%
no Icon
la.bot.arm.elf
2024-10-24 21:02:08 +02:00
Info
Class
Malicious
AV: 34%
no Icon
la.bot.arm.elf
2024-10-24 21:02:08 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column