top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Sigma
AV: 0%
LADMAutoInstallService.exe.7z
2024-11-20 13:28:52 +01:00
Info
Class
no
Graph
Malicious
  • Yara
  • Suricata
LummaC
AV: 39%
file.exe
2024-11-20 13:26:09 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 39%
file.exe
2024-11-20 13:26:08 +01:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 29%
file.exe
2024-11-20 13:26:06 +01:00
Info
Class
Malicious
AV: None
file.exe
2024-11-20 13:26:05 +01:00
Info
Class
Malicious
  • Sigma
AV: 0%
LADMAutoInstallService.exe.7z
2024-11-20 13:25:11 +01:00
Info
Class
no
Graph
Clean
https://kreskamaki.pl/&ved=2ahUKEwjXsdXPoeaJAxXOV0EAHeHeI60QFnoECBgQAQ&usg=AOvVaw3Fydc_x43m7WUzJ18d737f
2024-11-20 13:24:40 +01:00
Info
Clean
malo.zip
2024-11-20 13:24:26 +01:00
Info
Clean
malo.zip
2024-11-20 13:22:08 +01:00
No classification & info
Incomplete analysis
AV: None
mime-attachment
2024-11-20 13:19:27 +01:00
No classification & info
Suspicious
  • Sigma
MOUSE DRIVER V628M Setup.exe
2024-11-20 13:19:01 +01:00
Info
Class
Malicious
  • Sigma
AV: 0%
LADMAutoInstallService.exe.7z
2024-11-20 13:17:51 +01:00
Info
Class
no
Graph
Malicious
AV: 5%
ocs.exe
2024-11-20 13:17:22 +01:00
Info
Clean
  • Suricata
https://the-business-legion.com/event/index.php?bZmCpRz=2dvuetql153-10061qw6ll248-us59w57-1dgz7320cvn95943
2024-11-20 13:14:51 +01:00
Info
Clean
https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://kreskamaki.pl/&ved=2ahUKEwjXsdXPoeaJAxXOV0EAHeHeI60QFnoECBgQAQ&usg=AOvVaw3Fydc_x43m7WUzJ18d737f
2024-11-20 13:14:46 +01:00
Info
Malicious
HTMLPhisher
AV: None
https://groupjlansen.com/?klkzhkfz
2024-11-20 13:08:25 +01:00
Class
no
Graph
Malicious
AV: 5%
EngMain9.exe
2024-11-20 13:07:42 +01:00
No classification & info
Malicious
AV: None
https://etiv-tcaer.vercel.app/
2024-11-20 13:06:21 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Amadey
AV: 53%
file.exe
2024-11-20 13:06:06 +01:00
Info
Class
Clean
https://enea.ubuy.cineca.it/PortaleAppalti/it/recover.wp?token=69c93b869b8419c83146b1bac1a381cc5b6f8ddd&e=ef878189&h=fc6c4cdd&f=n&p=y
2024-11-20 12:56:47 +01:00
No classification & info
no
Graph
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column