top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
Excel15.xlb
2025-01-15 18:39:27 +01:00
No classification & info
Clean
273985_16.DEPAU SISTEMAS SL._CFN25015343.pdf
2025-01-15 18:38:52 +01:00
Info
Malicious
sh.bin
2025-01-15 18:35:10 +01:00
Info
Clean
sh.zip
2025-01-15 18:32:38 +01:00
No classification & info
no
Graph
Suspicious
http://www.bethelwoods.org
2025-01-15 18:29:41 +01:00
Info
Class
Clean
https://lists.mcgill.ca/scripts/wa.exe?TICKET=NzM5Mjk1IGxlbm5hcnpAVFJJVU1GLkNBIE5FWE8tQ0FOQURBIF%2B2zNuvXgUN&c=SIGNOFF
2025-01-15 18:29:16 +01:00
No classification & info
no
Graph
Suspicious
no Icon
razer-partners.com.html
2025-01-15 18:28:10 +01:00
Info
Class
Malicious
AV: 34%
no Icon
oD2XngYscZ.ps1
2025-01-15 18:27:10 +01:00
Info
Suspicious
  • Sigma
DeskTimeSetup.exe
2025-01-15 18:26:20 +01:00
Info
Class
Clean
https://armadasamudraglobal.com/doc/mm.php__;!!Ofz1Xjg!8IBoxRCqe1nRRI5FNSOW6ZxmlMSqVCDMpC9kd_g-Gy4P0nJdYLMVo0RoUxEypxsi02YaZ5dhy5x2r4wqNsVTlISh1wo5opSYeA$
2025-01-15 18:26:14 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
MassLogger RAT
AV: 10%
BNXCXCJSD.jse
2025-01-15 18:25:14 +01:00
Info
Class
Malicious
  • Sigma
  • Suricata
download.ps1
2025-01-15 18:25:09 +01:00
Info
Class
Malicious
  • Sigma
  • Suricata
download.ps1
2025-01-15 18:25:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC
AV: 5%
no Icon
new-riii-1-b.pub.hta
2025-01-15 18:24:09 +01:00
Info
Class
Clean
http://potsaglu.net
2025-01-15 18:23:33 +01:00
Info
Suspicious
http://141.8.192.169
2025-01-15 18:23:13 +01:00
Info
Malicious
  • Yara
  • Suricata
Prometei
AV: 32%
no Icon
na.elf
2025-01-15 18:23:08 +01:00
Info
Class
Clean
https://r.envoi.eeva.net/tr/un/li/kwezYt0x649-vMy1-d3m8XWm0XDG9tdQGXwiNuM2LGBkoE_XVSp9wKRKTTo84zlVB30dtE4Qxb6bTdQ7BLiXy4vJLNGaMqGupBNu6KitW_AR1uqeyWU4G1Jbs8y7H-FTWpH-kUlzeBVIIZhezEix_Juexn4ZIOxJvZntvjaVOZRauce-TQQjIsMdtQe92HQHFZ4uqUrxeDlPccAo9Yhwy9FCZGRicVrFDp8pXgJzm-17u_h3Ps2IWs7KrW7e4hI
2025-01-15 18:19:20 +01:00
Info
Malicious
  • Yara
P.O No.4036041334.doc
2025-01-15 18:17:11 +01:00
Info
Malicious
  • Sigma
AV: 37%
Order.xls
2025-01-15 18:17:08 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column