top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Vidar
AV: 0%
file.exe
2024-10-03 15:13:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
Babadeda
AV: 0%
EtEskr.exe
2024-10-03 15:12:11 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
GuLoader, FormBook
AV: 13%
FACTURA-002297.exe
2024-10-03 15:12:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
FormBook
AV: 32%
SOA AUG 2024 - CMA CGM.exe
2024-10-03 15:12:05 +02:00
Info
Class
Incomplete analysis
AV: None
https://take.supersurvey.com/Q6RX6UV5H/*
2024-10-03 15:11:50 +02:00
Info
Suspicious
Application.Network.ScanConverter2.x64.exe
2024-10-03 15:10:19 +02:00
Info
Class
Clean
https://post.spmailtechnolo.com/f/a/_lofmEJxq-9IHF0jCEccBA~~/AAMCAAA~/RgRo3YvnP4QNAWh0dHBzOi8vdHgyMTF0aXJuLmNvbW11bml0eW9zLm9yZy9SVU0tUHVibGljLVJldmlzaW9uL3JlbmRlci9pZC8yNzM0L2Zvcm0vc2VydmljZS9yZWNvcmRfaWQvNzg2My9yZXZ0L201ajhYV200emxUQWNwV3doeHpzMkZRRkppaldMMCI-aHR0cHM6Ly90eDIxMXRpcm4uY29tbXVuaXR5b3Mub3JnL1JVTS1QdWJsaWMtUmV2aXNpb24vcmVuZGVyL2lkLzI3MzQvZm9ybS9zZXJ2aWNlL3JlY29yZF9pZC83ODYzL3JldnQvbTVqOFhXbTR6bFRBY3BXd2h4enMyRlFGSmlqV0wwPC9hVwNzcGNCCmb45wb7ZhFOc6hSGHNhZGFtc0Bsb25ndmlld3RleGFzLmdvdlgEAAAARg
2024-10-03 15:08:25 +02:00
No classification & info
no
Graph
Clean
https://go.fhmchc.org/e/1082453/2024-10-02/4jdfj1/2749392279/h/yT2pQ8kLopdjnY-DRaZwaJddOAgNE7yFzWjyxxKOC_E
2024-10-03 15:06:59 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
  • Suricata
RDPWrap Tool
AV: 68%
file.exe
2024-10-03 15:06:10 +02:00
Info
Class
Clean
https://docs.google.com/spreadsheets/d/1yt5HFktpgsELwC_Xa5gpV_hzSAPOYgqMKzvj3SM4YvU/edit?usp=sharing
2024-10-03 15:05:35 +02:00
Info
Malicious
HTMLPhisher
AV: None
https://docs.google.com/forms/d/e/1FAIpQLSd11N0abxlW-jWhsgCqQSv4dirOC7CnOJxj0NYrOSmFOvEaMg/viewform?usp=pp_url
2024-10-03 15:02:52 +02:00
Info
Class
Malicious
  • Sigma
  • Suricata
AV: None
http://Warehousingpro.com
2024-10-03 14:56:36 +02:00
Info
Class
no
Graph
Clean
https://7dnvo4dz9orl5r86.click.mailersend.net/tl/cws/eyJpdiI6Im1vSXBOU29SdUliTUxsWTZMeDAzZlE9PSIsInZhbHVlIjoiQUdpRWxMYjJ5Z2JkdXdzNENzMnBPNzBwdFk3OHA3d1FKU1JmS2pUK0N1RERNSzlGTWthQVVhZThxMjlEZExCcTRaWTVCVysrYmI3K3QxbGpmeDY0cytiMGtvMC9ua05DS3dRMnBiWC9zWUFCRCtCUFByc1l6RVFNUnZMYnoyRm4iLCJtYWMiOiIxMjQyNzZhYWFjNjY5ZDllMzUwN2Y1Zjg0ZTM3ODFlNmUzYzExZjgwYWU1YTBiNjgxZGM0NjY2ODMzN2Q4YzQxIiwidGFnIjoiIn0
2024-10-03 14:53:25 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 0%
1 (2).cmd
2024-10-03 14:52:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 0%
payload.cmd
2024-10-03 14:52:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 0%
rbx-CO2.bat
2024-10-03 14:49:13 +02:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 16%
file.exe
2024-10-03 14:49:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 21%
SC.cmd
2024-10-03 14:49:08 +02:00
Info
Class
Clean
game.exe
2024-10-03 14:48:43 +02:00
Info
Malicious
  • Yara
  • Suricata
Stealc
AV: 42%
file.exe
2024-10-03 14:46:05 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column