top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Sigma
AV: 8%
SecuriteInfo.com.Win64.TrojanX-gen.22573.8055.exe
2024-10-07 18:23:07 +02:00
Info
Class
Clean
https://clt1721401.benchurl.com/c/l?u=11A4AD02&e=18D710E&c=1A4439&t=0&l=1112B6FBA&email=WfkO0EZdK9G0PAordUJgoG5usfNWoAHXfMGPOVnZMlE%3D&seq=1
2024-10-07 18:22:10 +02:00
Info
Malicious
  • Yara
Credential Flusher
AV: None
file.exe
2024-10-07 18:22:05 +02:00
Info
Class
Clean
https://northstargaming.ca/
2024-10-07 18:18:53 +02:00
Info
Clean
http://whois.nic.ru
2024-10-07 18:18:18 +02:00
No classification & info
no
Graph
Clean
Quote_Quote-32812_1728306487562.pdf
2024-10-07 18:04:38 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 32%
Ref#0503711.exe
2024-10-07 18:04:08 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-07 18:02:08 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 45%
file.exe
2024-10-07 18:02:08 +02:00
Info
Class
Malicious
  • Yara
AV: 24%
QUG24-2003700542005180.exe
2024-10-07 18:02:08 +02:00
Info
Class
Clean
http://broker.gotoassist.com
2024-10-07 18:01:07 +02:00
Info
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 47%
z71htmivzKAUpOkr2J.exe
2024-10-07 18:01:07 +02:00
Info
Class
Clean
https://baserow.io/public/grid/YKlpCvFr0mJZ9dw-EtVEByGkcB_PVh6xPPRBJ4wCwIY/__;!!HkjQSg!x-IZafsMmQXGsUxec8GQ7gXY-wWqeVQ5kUXDuZNOX18LTPhSyYP4kxsv6LiE0NCFGa1TkyUiBvoVVJMG$
2024-10-07 17:59:42 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC
AV: 34%
vEcIHT68pU.exe
2024-10-07 17:59:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Stealc
AV: 32%
5rVhexjLCx.exe
2024-10-07 17:59:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Stealc, Vidar
AV: 34%
NdSXVNeoET.exe
2024-10-07 17:59:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Vidar
AV: 37%
VLSiVR4Qxs.exe
2024-10-07 17:59:07 +02:00
Info
Class
Clean
http://i.ytimg.com
2024-10-07 17:57:56 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Suricata
Socks5Systemz
AV: 21%
etwSnBeIC2.exe
2024-10-07 17:56:05 +02:00
Info
Class
Malicious
HtmlDropper
AV: None
https://t.dripemail3.com/c/eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJkZXRvdXIiLCJpc3MiOiJtb25vbGl0aCIsInN1YiI6ImRldG91cl9saW5rIiwiaWF0IjoxNzI4MzEwODA2LCJuYmYiOjE3MjgzMTA4MDYsImFjY291bnRfaWQiOiIyNzYyNjA5IiwiZGVsaXZlcnlfaWQiOiJwODJtNGNzMzB4cXl2Zmh0NzQxaSIsInRva2VuIjoicDgybTRjczMweHF5dmZodDc0MWkiLCJzZW5kX2F0IjoxNzI4MzA5NzMyLCJlbWFpbF9pZCI6OTk2NDE4NiwiZW1haWxhYmxlX3R5cGUiOiJCcm9hZGNhc3QiLCJlbWFpbGFibGVfaWQiOjM5NTQwMTYsInVybCI6Imh0dHBzOi8vZGFpbHlhbGFza2EuY29tL25ld3M_X19zPWw5bzljOTZzbG8xZjF3aGFiODZrJnV0bV9zb3VyY2U9ZHJpcCZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj0lRjAlOUYlOTElOEMrV2UrTWFkZStJdCtFYXN5K0ZvcitZb3UrJUYwJTlGJTkxJThDIn0.MNRoosOspCCWwx3VuYY41W-crcEzfjjfIELlO_QMAdM
2024-10-07 17:55:50 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column