top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
AV: 34%
no Icon
la.bot.mipsel.elf
2024-10-23 07:31:08 +02:00
Info
Clean
https://momentum-innovation-2798.my.salesforce.com/sfc/p/J6000000HZRz/a/J60000005RI2/HiYHFRdVg2HkmlE9wv1tSplmmrCLqUmC01X5_Ari3AE
2024-10-23 07:29:48 +02:00
Info
Clean
no Icon
d1TtkSBl05
2024-10-23 07:29:08 +02:00
Info
Malicious
  • Yara
  • Sigma
FormBook
AV: 29%
SecuriteInfo.com.Win32.MalwareX-gen.12389.27465.exe
2024-10-23 07:22:09 +02:00
Info
Class
Malicious
SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
2024-10-23 07:22:08 +02:00
Class
Malicious
  • Suricata
https://polixh.weebly.com/
2024-10-23 07:21:32 +02:00
Info
Class
Malicious
  • Yara
Mirai
AV: 34%
no Icon
la.bot.powerpc.elf
2024-10-23 07:21:06 +02:00
Info
Class
Malicious
AV: 37%
no Icon
la.bot.arm6.elf
2024-10-23 07:21:06 +02:00
Info
Clean
z91dxf____.exe
2024-10-23 07:05:06 +02:00
No classification & info
Malicious
  • Yara
  • Suricata
DBatLoader, FormBook
AV: 54%
z10982283782.exe
2024-10-23 07:01:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Vidar
AV: 45%
7ZthFNAqYp.exe
2024-10-23 07:01:11 +02:00
Info
Class
Malicious
HTMLPhisher
AV: 0%
https://www.google.co.nz/url?q=nL206935ZEtyvV206935l&sa=t&url=amp/%69%70%66%6F%78%2E%63%6F%2E%75%6B%2F%70%61%67%65%73%2F%74%68%61%6E%6B%73%2E%68%74%6D%6C#cnlhbi5zcGVuY2VyQHVzLnlhemFraS5jb20=
2024-10-23 06:59:49 +02:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-23 06:52:06 +02:00
Info
Class
Malicious
HTMLPhisher
AV: 0%
https://login.officefitnesschallenge.com/generate-doc-uid-mkopl4uyg6rde32ws
2024-10-23 06:46:07 +02:00
Info
Class
Clean
https://t3sp2vzrhieujyp67175b9328f1f.manufect.com/d4761486d567859506150/hdQrcEwPXaK/6a6362784e6e4e4b4561&_webpack
2024-10-23 06:46:07 +02:00
Info
Clean
https://bmypage.kuronekoyamato.co.jp/
2024-10-23 06:38:57 +02:00
Info
Malicious
 Order_shizcon October order %100% S51105P-E01 (見積依頼)jpg .exe
2024-10-23 06:38:37 +02:00
Info
Malicious
1PI1dOAtKY.exe
2024-10-23 06:29:32 +02:00
Info
Malicious
HtmlDropper
AV: 0%
https://www.filemail.com/t/cFCAI9C4
2024-10-23 06:28:31 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 83%
file.exe
2024-10-23 06:26:10 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column