top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
http://https:/u.infotracktiu.top/l
2024-10-03 18:38:07 +02:00
Info
Incomplete analysis
AV: None
https://chjhumenjegbbmhy/
2024-10-03 18:37:22 +02:00
Info
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 0%
file.exe
2024-10-03 18:37:06 +02:00
Info
Class
Clean
http://star6kz.agency
2024-10-03 18:27:22 +02:00
Info
Clean
https://www.stackadapt.com
2024-10-03 18:25:53 +02:00
Info
Clean
https://eauthentication.emlnk9.com/lt.php?x=3DZy~GE7VnDL6578yN~OVhNs1H-lutfuwulkZHfMIIKf55V_0Uy.xuG-142hmNf
2024-10-03 18:21:36 +02:00
Info
Clean
msgtopstdemo.exe
2024-10-03 18:21:13 +02:00
Info
Malicious
  • Yara
  • Suricata
Phisher
AV: None
https://dsfghfdaregfdgshfgdfh.blob.core.windows.net/dsfghfdaregfdgshfgdfh/l1.html#9/372-16527/1270-243896-29108
2024-10-03 18:17:35 +02:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: None
file.exe
2024-10-03 18:15:09 +02:00
Info
Class
Clean
http://fearsomesubordinatehole.com
2024-10-03 18:11:06 +02:00
No classification & info
no
Graph
Malicious
AV: None
https://u9313450.ct.sendgrid.net/ls/click?upn=u001.ZfA-2BqTl2mXIVteOCc-2BANg-2BtYQAbYWaU-2BKDDWa611GxHig-2BgElXnUy1eAOeNoTI9ToS9WuAxRUdR21lAIsTPE0g-3D-3Dd8kL_bf4JG6rVotaFp8XsYJMcbHq5p6ju5xz6OkJFWJQMhev1YsQkFFV7zJr96yz5256BnjjwP-2FrVNKeomJDukUeXnM2-2FUbrpvrFpNFdN8Hxo-2B8NA1G5PPzQiWnVnq4RPrf4MxseS-2FjeJBGe3OOYXNXxDmns1gfYeFwrIC6tXtQ3KJv23PKABAyqpBB-2FnsXl7BropPMbry14s3UYpaAeg1aJih0NQeQpVSOm5MBDYOXEHCyJCtLrpoW6SuZeJlGeeWyYAhbotSAdFsjwH5JN5fjIYp-2BMzHm9VPykPI2oeKmW91mIcQqO5YJ1dVv925b7N0T1v
2024-10-03 18:10:34 +02:00
Info
Class
Clean
http://digital.fidelity-secure.com/
2024-10-03 18:07:35 +02:00
Info
Malicious
AV: None
http://reviewnewdocuments.wordpress.com/
2024-10-03 18:04:11 +02:00
Info
Class
Clean
https://hidrive.ionos.com/lnk/cuMBgdsxt
2024-10-03 18:01:49 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Suricata
GuLoader, FormBook
AV: 18%
rpedido-002297.exe
2024-10-03 18:01:07 +02:00
Info
Class
Clean
https://drive.google.com/file/d/1CMBfkYnq-F80PpIfI3ugThzxOvNncq4X/view?usp=sharing_eip&ts=66fde3dc
2024-10-03 18:00:12 +02:00
Info
Clean
https://zapier.com/manage/zaps/260804844/stop/?check=IjI2MDgwNDg0NCI:1sw6GK:uv5U5bs_AnY16h4uo_BzI3aI4ksuRZ1R0-V1GaGYufM
2024-10-03 17:57:21 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
Stealc
AV: 88%
40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
2024-10-03 17:56:06 +02:00
Info
Class
Malicious
AV: None
https://docsend.com/view/ws65kkaar2fwghua
2024-10-03 17:55:10 +02:00
Info
Clean
https://app.box.com/s/r8gf6zpgg0th9kl4z0pfx4tefjsvexvc
2024-10-03 17:54:44 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column