top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
https://pckg.ai/X5KpCErF
2024-11-20 21:24:51 +01:00
No classification & info
no
Graph
Malicious
  • Sigma
HTMLPhisher
AV: None
SBAFLA TeamCALL marcia.main__ (lo).msg
2024-11-20 21:24:21 +01:00
Info
Class
no
Graph
Malicious
AV: None
http://th-42-0.914trk.com
2024-11-20 21:20:15 +01:00
Info
Clean
Gwyddion-2.67.win64.exe
2024-11-20 21:20:14 +01:00
Info
Clean
Exhibit 7 - Catalogue Mattress-Jan 2024.pdf
2024-11-20 21:19:30 +01:00
Info
Suspicious
http://getwiplash.com
2024-11-20 21:19:14 +01:00
Info
Clean
https://forms.gle/PP1myaVZHGwAABJ89
2024-11-20 21:17:32 +01:00
Info
Clean
yDoZVwXSMG.exe
2024-11-20 21:14:37 +01:00
Info
Clean
https://pckg.ai/X5KpCErF
2024-11-20 21:13:19 +01:00
Info
Clean
https://t.ly/wqzp5
2024-11-20 21:11:23 +01:00
No classification & info
no
Graph
Malicious
AV: 42%
no Icon
arm.elf
2024-11-20 21:07:12 +01:00
Info
Malicious
AV: 39%
no Icon
spc.elf
2024-11-20 21:07:07 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Cryp
AV: 53%
file.exe
2024-11-20 21:07:07 +01:00
Info
Class
Clean
no Icon
OYY8175H4I4UW7Q1TEI.jpg
2024-11-20 21:05:21 +01:00
No classification & info
Malicious
  • Yara
  • Sigma
  • Suricata
Amadey, Stealc, Vidar
AV: 53%
file.exe
2024-11-20 21:04:11 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 34%
file.exe
2024-11-20 21:04:06 +01:00
Info
Class
Malicious
AV: None
file.exe
2024-11-20 21:04:06 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-11-20 21:03:05 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 42%
Thermo Fisher Scientific - Ajánlatkérés.exe
2024-11-20 21:00:08 +01:00
Info
Class
Clean
https://postoffice.adobe.com/po-server/link/redirect?target=eyJhbGciOiJIUzUxMiJ9.eyJ0ZW1wbGF0ZSI6Imltc19zb2NpYWxfbGlua2luZ19jb2RlIiwiZW1haWxBZGRyZXNzIjoiZGhheWxvY2tAb3B0YWdyb3VwbGxjLmNvbSIsInJlcXVlc3RJZCI6IjJhYjUxZDk2LWMxYWItNGRkMy1hYzRkLWU3MzZkYWUzNWUyNSIsImxpbmsiOiJodHRwczovL3d3dy5hZG9iZS5jb20vZ28vYWRvYmUtYWNjb3VudC1hY2Nlc3MtYXBwLXN0b3JlIiwibGFiZWwiOiI5IiwibG9jYWxlIjoiZW5fVVMifQ.V9v82Wlmgp3guPy7_e_y6Aj-8sguEKzJFgakjYA1ro2G6v4HssgvzZ7FXBjcT8LSGpaCYlP2WiB8XJwU6hCqIg
2024-11-20 20:59:27 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column