top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Suspicious
VisualStudioSetup.exe
2024-05-23 18:26:52 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Outlook Phishing, HTMLPhisher
AV: None
https://assets-fra.mkt.dynamics.com/0cc4a623-6510-ef11-9f83-002248da15fa/digitalassets/standaloneforms/6e39a88b-9710-ef11-9f89-002248d9c773
2024-05-23 18:26:26 +02:00
Info
Class
Suspicious
https://nvcc-csm.symplicity.com/employers
2024-05-23 18:26:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AV: 29%
file.vbs
2024-05-23 18:26:11 +02:00
Info
Class
Clean
new.bat
2024-05-23 18:26:06 +02:00
Info
Malicious
  • Sigma
AV: 0%
Windows_Update.bat
2024-05-23 18:25:16 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AV: 29%
windows.vbs
2024-05-23 18:25:11 +02:00
Info
Class
Malicious
  • Sigma
AV: 0%
new.vbs
2024-05-23 18:25:11 +02:00
Class
Malicious
  • Sigma
AV: None
INVOICE#RVEBSAKSA.vbs
2024-05-23 18:25:11 +02:00
Class
Clean
https://downloads.imazing.com/windows/iMazing/iMazing3forWindows.exe
2024-05-23 18:24:56 +02:00
Info
no
Graph
Malicious
  • Yara
  • Sigma
  • Snort
GuLoader, XWorm
AV: 8%
windows.vbs
2024-05-23 18:24:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
GuLoader, XWorm
AV: 29%
file.vbs
2024-05-23 18:24:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
GuLoader
AV: 8%
update.vbs
2024-05-23 18:24:05 +02:00
Info
Class
Clean
file.bat
2024-05-23 18:23:10 +02:00
Info
Clean
windows_update.bat
2024-05-23 18:23:10 +02:00
Info
Malicious
  • Yara
  • Sigma
GuLoader
AV: 8%
time.vbs
2024-05-23 18:23:05 +02:00
Info
Class
Malicious
HtmlDropper, HTMLPhisher
AV: None
https://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621
2024-05-23 18:21:09 +02:00
Info
Class
Clean
http://www.canterburyroyalegourmet.com/
2024-05-23 18:20:09 +02:00
Info
Malicious
AV: None
https://sites.google.com/view/bakcsa3/?yj0&d=DwMFaQ
2024-05-23 18:17:28 +02:00
Info
Clean
https://www.dropbox.com/l/scl/AACCG6uoYUNBVtm6X5MKeyuAHsn7lQV0s6k
2024-05-23 18:15:13 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column