top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Suricata
Stealc
AV: 39%
file.exe
2024-11-21 11:02:10 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 29%
file.exe
2024-11-21 11:02:06 +01:00
Info
Class
Malicious
AV: None
file.exe
2024-11-21 11:02:04 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 63%
Wire slip account payable.pif.exe
2024-11-21 11:01:08 +01:00
Info
Class
Malicious
AV: 45%
no Icon
dlr.arm5.elf
2024-11-21 11:01:04 +01:00
Info
Clean
CloudTalk-Phone-3.2.7-win 1.exe
2024-11-21 10:59:28 +01:00
Info
Clean
  • Suricata
http://teaandrosemary.com
2024-11-21 10:57:48 +01:00
Info
Suspicious
dbgpProxy (1).exe
2024-11-21 10:57:38 +01:00
Info
Malicious
  • Sigma
AV: 24%
Документи.pdf.lnk
2024-11-21 10:50:07 +01:00
Info
Class
Clean
Sage.Eb.UniSign.Windows.exe
2024-11-21 10:45:48 +01:00
Info
Suspicious
  • Yara
  • Sigma
https://openboxinstaller.s3-eu-west-1.amazonaws.com/msi/0/1.9.99/OpenBoxAddInSetup.msi
2024-11-21 10:45:03 +01:00
Info
Class
Malicious
  • Sigma
AV: 0%
Sage.Eb.eIDSign.Windows.Installer.exe
2024-11-21 10:42:39 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AV: 3%
ud(1).bat
2024-11-21 10:40:08 +01:00
Info
Malicious
  • Yara
  • Sigma
AV: 3%
ud.bat
2024-11-21 10:40:07 +01:00
Info
Malicious
  • Yara
Credential Flusher
AV: 32%
file.exe
2024-11-21 10:37:07 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 39%
pmm.exe
2024-11-21 10:36:12 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 45%
file.exe
2024-11-21 10:36:12 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-11-21 10:36:12 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
GuLoader, Snake Keylogger
AV: 58%
Order requirements CIF Greece_pdf.exe
2024-11-21 10:35:10 +01:00
Info
Class
Malicious
  • Yara
KnowBe4
AV: None
https://cardpayment.microransom.us/XYmdKR004c2prdTQ3eFRYdTZlUlAwSGhsclU2V3JnMWpuZ2h3Njg2emV0U3ZLY1Z4RkpNZm9HbkpHck9SNjFHb01Yem5jSDVSb2RmaXRIWUNvN2g1UHR4NlNzM05yeWg0R2VJSzhzSFlRVTN6UFZHYWpZSUxBeXpsYmtPMjFua1J5RFlLdm5OUVBGRnl2UWRxSjhpUFRwL1VXS1RqNEJjMmJwNkVPOVkvV2o3S3R0MkYzS1VXOG5uS1hHVll2eDdUb3hmcGtBb2VBTUdHc3hweEtXV25WRVZKdDBwWCtVZGtobzFsamp3PS0tYVREdUlIcWNwNFJ5RjAxci0tQWs2bGpCejYzaGsxMWJqSll4TWFNQT09?cid=293298779
2024-11-21 10:33:49 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column