top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 83%
file.exe
2024-10-24 09:06:07 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-24 09:06:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 34%
faktura proforma pdf.exe
2024-10-24 09:02:05 +02:00
Info
Class
Malicious
AV: None
https://email.sg.on24event.com/ls/click?upn=u001.7kf5QUY4LGF7Fzt7LGE4bbPPsSPtBC4KXSPVJqWhtiFImaGOc8X-2FzF8FDlXshHtRJ6TIRZ6EeMzJLIlgf-2Fs2kSJOxf8XTG62Elbh9rqy-2FQ2QNZGXB54Mkq5upaOHB9GHJaF-2B3b4F-2FMyEt0RGHLDpLKRhLl9mxjPD0y5Swi37OTA-3DOBST_mhsMQQwIM9hexyWqOlUPbBh1Ydv5cYoDRZfJchLEEeKy4ZjgP9CBDSdvgDFEefqBVXHw4Mv6KQHsP3gT468tApWXvWK-2FeXhqGfYYlnX46U5WmntG47XCU85W-2B7YcCKnv6RkyD-2BGsL6eKQti9UGCTMQ9mNlYRCUnfVenBdKFDHBLCSg5nmfwfVylxfV1LsL0vuEyDgr8SC57Mq-2BhfexPfdy0Rg72muov-2F70SqaHW8j0XfAmx9zQy8hYRRlnIIGbyzjoQcdYcq0btsMQpdS6jNo-2BNvozXopiqu0Jz-2B-2B25Gyoj-2FyIelIDkNiGA84aUyGyfbMNmoNmmLB38ufi9uQKhxSQ-3D-3D
2024-10-24 08:50:16 +02:00
Info
Malicious
AV: 18%
VM2ICvV5qQ.pdf
2024-10-24 08:48:06 +02:00
Info
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-24 08:45:09 +02:00
Info
Class
Malicious
AV: None
no Icon
FedEx Shipping Document_pdf.html
2024-10-24 08:42:19 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Remcos
AV: 18%
scan_doc20241024.vbs
2024-10-24 08:41:13 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla, GuLoader
AV: 21%
OUTSTANDING PAYMENT STATUS 01199241024.vbs
2024-10-24 08:41:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
GuLoader
AV: 21%
EL-25-536_40005512_Le Cuivre_23102024.vbe
2024-10-24 08:41:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
GuLoader, Snake Keylogger
AV: 26%
RFQ_64182MR_PDF.R00.vbs
2024-10-24 08:41:08 +02:00
Info
Class
Malicious
  • Sigma
AV: 0%
MV EAGLE EYE RFQ-92008882920-PDF.vbs
2024-10-24 08:40:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 63%
transferencia interbancaria_66579.xlam.xlsx
2024-10-24 08:39:18 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AV: 68%
Comprobante de pago.xlam.xlsx
2024-10-24 08:39:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 71%
Orden de Compra No. 78986756565344657.xlam.xlsx
2024-10-24 08:39:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 66%
PO-008847332.xlam.xlsx
2024-10-24 08:39:12 +02:00
Info
Class
Clean
  • Sigma
invoice#00976.lnk
2024-10-24 08:39:12 +02:00
No classification & info
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 0%
Urgent Quotation documents One Pdf.vbs
2024-10-24 08:39:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Lokibot
AV: 25%
Shipping Documents WMLREF115900.xls
2024-10-24 08:38:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 18%
A & C Metrology OC 5457144.xls
2024-10-24 08:38:06 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column