top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
https://drive.google.com/file/d/1tw9FfjIIxyTQuufUfrBn9eWavPHgeQc4/view?usp=sharing_eip&invite=CN_8-aEJ&ts=6803711d
2025-05-05 19:18:28 +02:00
Info
no
Graph
Clean
  • Suricata
https://www.g2.com/contributor/o-c-tanner-vs?secure%5Bpage_id%5D=o-c-tanner-vs&secure%5Brewards%5D=true&secure%5Btoken%5D=d7a514ccfadd97e177405ae61860a06e41fb16b6f2d6a983b765c9793b5a0af2&utm_source=OCT
2025-05-05 19:17:52 +02:00
Info
Incomplete analysis
AV: None
http://www.tmdick.drdaopoedd.com/
2025-05-05 19:15:57 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
AsyncRAT
AV: 86%
as.exe
2025-05-05 19:15:22 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Prometei
AV: 49%
no Icon
na.elf
2025-05-05 19:11:20 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai, Gafgyt
AV: 69%
no Icon
skid.x86.elf
2025-05-05 19:11:15 +02:00
Info
Class
Clean
MDE_File_Sample_9d7d96e1e2c2f4ff31ed13e450b7d685c496c5c7.zip
2025-05-05 19:10:10 +02:00
Info
Malicious
  • Yara
Mirai
AV: 56%
no Icon
mqar5.elf
2025-05-05 19:06:13 +02:00
Info
Class
Malicious
  • Sigma
ORDER-2505789-8417.js
2025-05-05 19:04:17 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 8%
Doc Scan. 20250505PDF.vbe
2025-05-05 19:04:17 +02:00
Info
Class
Malicious
  • Yara
CryptOne
AV: 53%
random.exe
2025-05-05 19:03:20 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC Stealer
AV: 65%
random.exe
2025-05-05 19:03:20 +02:00
Info
Class
Malicious
  • Yara
CryptOne
AV: 56%
random.exe
2025-05-05 19:03:19 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC Stealer
AV: 69%
random.exe
2025-05-05 19:03:16 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC Stealer
AV: 67%
random.exe
2025-05-05 19:03:12 +02:00
Info
Class
Malicious
  • Yara
CryptOne
AV: 62%
random.exe
2025-05-05 19:03:12 +02:00
Info
Class
Malicious
HTMLPhisher, Tycoon2FA
AV: None
https://r.srvtrck.com/v1/redirect?api_key=cc86ea3a04806258ca5dfd8a1fdab564&type=url&site_id=258fdff975614989a5989d6db151206a&yk_tag=6-1-1176814-1-0-0&url=https%3A%2F%2Ftoloba.co.ke/image/%23a2tpbGlhbkBiaGNiY3BhLmNvbQ==
2025-05-05 19:02:53 +02:00
Info
Class
Malicious
  • Yara
HTMLPhisher
AV: 3%
Summon Court Document.pdf
2025-05-05 19:02:18 +02:00
Info
Class
no
Graph
Malicious
  • Yara
CryptOne
AV: 47%
random.exe
2025-05-05 19:02:13 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
PureCrypter, ResolverRAT
AV: 75%
ZN2GbnFiCl.exe
2025-05-05 18:56:22 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s) Live Interaction
Customization Show ID column