top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Suricata
Prometei
AV: 50%
no Icon
na.elf
2025-04-07 07:33:08 +02:00
Info
Class
Malicious
DefaultSetup.exe
2025-04-07 07:28:58 +02:00
No classification & info
Malicious
  • Yara
  • Suricata
Prometei
AV: 50%
no Icon
na.elf
2025-04-07 07:28:10 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Prometei
AV: 39%
no Icon
na.elf
2025-04-07 07:23:11 +02:00
Info
Class
Suspicious
  • Sigma
  • Suricata
Scorecard - Consumer_Products CPROD-EUR-C00-P0-23.1.0.xlsx
2025-04-07 07:01:32 +02:00
Info
Class
Malicious
  • Yara
Nitol
AV: 67%
CirnoRAT.exe
2025-04-07 07:01:16 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
GuLoader
AV: 16%
z8Document_PDF.scr.exe
2025-04-07 07:00:14 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook, PureLog Stealer
AV: 39%
wN2CkbzxeQPK0sV.bat.exe
2025-04-07 06:57:08 +02:00
Info
Class
Clean
  • Suricata
https://s7mbrstream.scene7.com/is/content/microsoftassets/_media_/98e/98eab0b1-8bc0-4332-98cd-447747ee3120-audio.mp4?utm_medium=fmp4_dash
2025-04-07 06:56:24 +02:00
Info
no
Graph
Malicious
  • Yara
AgentTesla, PureLog Stealer
AV: 47%
AGENCY APPOINTMENT - 07.04.2025.pdf.scr.exe
2025-04-07 06:54:05 +02:00
Info
Class
Clean
https://na3.docusign.net/Signing/EmailStart.aspx?a=97730845-4a81-4e53-9d9c-e81d150a7111&etti=24&acct=8ec2af1e-4cae-43fb-8237-4881d713c2c3&er=0a584b8d-516a-49b9-b48a-b394cc69cfb8&ensd=OlmiHSbJ0eI9ZkG%252fXULDaguF9ff1m2vMEaV1F%252b5OxrJkhG96p9ISA0CoRUmLFVhXioR22fk%252bJrW2j5xmJ1ZKyY1GmNtfIpFdKaXPrbX8g0b3UX0IbV9WAwez4BGzSltYX%252fSy0zI609EqSgn1gLhdiIu9yA5LIS%252bTrKFns8wXR4tBRobW6LZqdL6AZZ7LJI%252b5
2025-04-07 06:38:49 +02:00
Info
Malicious
  • Yara
  • Suricata
Prometei
AV: 50%
no Icon
na.elf
2025-04-07 06:23:09 +02:00
Info
Class
Malicious
  • Yara
AgentTesla, PureLog Stealer
AV: 44%
Verrazane_Q88 V6 (LPG)_07Apr2025.pdf.scr.exe
2025-04-07 06:16:13 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Prometei
AV: 50%
no Icon
na.elf
2025-04-07 06:13:11 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Prometei
AV: 39%
no Icon
na.elf
2025-04-07 06:13:11 +02:00
Info
Class
Malicious
AV: 33%
no Icon
morte.arm.elf
2025-04-07 06:08:09 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
MSIL Logger, MassLogger RAT, PureLog Ste
AV: 31%
REQ NO. 88484.exe
2025-04-07 06:04:10 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Prometei
AV: 39%
no Icon
na.elf
2025-04-07 06:03:08 +02:00
Info
Class
Malicious
  • Yara
no Icon
morte.x64.elf
2025-04-07 05:58:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 44%
Offer Inquiry 00125.exe
2025-04-07 05:55:16 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s) Live Interaction
Customization Show ID column