top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
CA-70408.zip
2024-10-23 15:44:48 +02:00
No classification & info
Clean
CA-70408.zip
2024-10-23 15:43:25 +02:00
No classification & info
Clean
http://www.cjblore.org/js/slicknav.min.js
2024-10-23 15:42:21 +02:00
Info
Clean
https://app.hellosign.com/t/ca4470a99d4eaab31151d82c586e584d17e82553?utm_campaign=multisigner_complete&utm_source=default&utm_channel=product_promo&utm_medium=email&utm_content=original
2024-10-23 15:41:41 +02:00
Info
Clean
CA-70408.zip
2024-10-23 15:41:37 +02:00
No classification & info
Malicious
  • Yara
  • Suricata
Stealc
AV: 39%
4M3JIACIWk.exe
2024-10-23 15:41:05 +02:00
Info
Class
Suspicious
https://www.poste.it/cerca/index.html#/risultati-spedizioni/368C21004373E/947
2024-10-23 15:39:45 +02:00
Class
no
Graph
Malicious
AV: None
https://re.e-sharedonedrivefile.com/skjashd
2024-10-23 15:36:32 +02:00
Info
Clean
https://gop-win.co/k3I0yr
2024-10-23 15:36:22 +02:00
Info
Malicious
AV: None
https://hnamedmr.ukremediatlon.co.uk/LVGwXwqP
2024-10-23 15:34:06 +02:00
Info
Suspicious
file.exe
2024-10-23 15:33:10 +02:00
Info
Malicious
AV: None
https://hnamedmr.ukremediatlon.co.uk/LVGwXwqP
2024-10-23 15:32:10 +02:00
Info
Malicious
  • Sigma
AV: 3%
file.exe
2024-10-23 15:32:08 +02:00
Info
Class
Malicious
  • Sigma
  • Suricata
AV: 7%
file.exe
2024-10-23 15:32:05 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AV: 26%
https://t.ly/ZPR23.10
2024-10-23 15:27:58 +02:00
Info
Class
no
Graph
Incomplete analysis
  • Sigma
AV: None
http://gfs270n897.userstorage.mega.co.nz/vDsJipVCmIA8jQe-PlRfyxqVg_Pwdq6-f5sTGIKIBR9KC1nNuU663SmrJUAg7QDwIkMg0g
2024-10-23 15:27:10 +02:00
Info
Clean
http://societyinsightsitc.com/63911-350418/161061?uid=3vdtx8xsjnmcj8qsckf5aqlgr4vd4s%26amp;prom%5ftype=regular%26amp;prom%5fid=277993%26amp;pld=26l81sngpwngbf
2024-10-23 15:26:07 +02:00
Info
Suspicious
  • Sigma
John Garby.eml
2024-10-23 15:25:42 +02:00
Info
Malicious
AV: None
https://clinicaotoface1.websiteseguro.com/no/ai/
2024-10-23 15:24:09 +02:00
Info
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-23 15:22:09 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column