top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Suspicious
https://protect2.fireeye.com/v1/url?k=31323334-50bba2bf-3132a9b3-4544474f5631-e7d0c281c42a4d4d&q=1&e=df14ee8e-753f-4590-b8e3-072c58b9b9b7&u=https%3A%2F%2Fwww.jamesaircraft.com%2Fproducts%2Fair-induction-kits%2F
2024-10-07 21:29:43 +02:00
Info
Class
Malicious
  • Sigma
AV: 42%
T6l6gPxwQU.exe
2024-10-07 21:29:05 +02:00
Info
Class
Malicious
  • Yara
HTMLPhisher
AV: None
https://statics.teams.cdn.office.net/evergreen-assets/safelinks/1/atp-safelinks.html?url=https%3A%2F%2Fphpstack-1335745-4931432.cloudwaysapps.com%2F%23%26%26%2B~XanJlZEBwcm9hZy5jb20=&locale=en-us&dest=https%3A%2F%2Fteams.microsoft.com%2Fapi%2Fmt%2Fpart%2Famer-03%2Fbeta%2Fatpsafelinks%2Fgeturlreputationsitev2%2F&pc=dqIG3sYngZE8N2eRBkF7CAkOWKg5g3tGjnQGJGQlc61U8QGlKCs5AzH6JKtW7FyetS1g5oEXSNBKJVlJbTCgrea0O041dBSjafsPfOc5KxbMkQRnpwalZQdhHfcjoeWL7rzuDGG%252fj2e7scaAUTCy2PY0WmBb87rgNNPdmEQne%252f00jq9aOpwCvhJrGkNK5f8MP5jaUwccFhr9IIoVaCOrXUhSnuRv%252fw%252bxhUGpneOsAgBs7CjJQbmepBIHfEqwCkqvDbYbxYB4Hm9sLVAOFaz9VFMFSXPJt4MqeWAChikWLAZATmvniptR3h97WVF%252fZtjtm3RxdNyPROzhUvL92w9fdWmSw%252bHBxn5rMHOUpaQU16ZpcfATiVaU51fqKaYO2v4ZnK7axAavLgOpgAJivuE6JO2sqksPH41Z6PVam5c4J%252bwwz5Z2pqrOSxPxEcPGeDff%252bxp9PApNxpvURRLl98WzRw%252ftZEOu%252foKPhjN0OiTGAQDLRWTF%252bMCzSQg37tk7ZYUYYc0Ycs4xDjchhFprJCCSfrZ8WyHq6cjqmnbgDKRQig28xGNFnSDEeWMDBQeeeVyNqDv0FAAxkSAMO%252b7t4Qu1y0h0MHJYEb5pxfOYe8Pyfcsn7pyR%252fkKEqziEQVGlIETrpjVMNyrhJrnX9S%252flWaxf0H3tD%252fqMhzPysO9QdPSJTG054WE4jq5GRqTKu8P25t4KJLY15Oz2j5iCg7Bd5lczhgv4PQevplLuCGckM%252fs5EPk2r2FkSOxHF51EB5FR2TgXQR5UAp2BbaWTm9irKwSSUK5z1MsGMDokVMEB4bQ9mpZrl1%252bDMixJ1mQyyLXpelmEyN8zw1nTsbXAvDQgIvPLPj0QUtphEMnmVEXMkQHiw2WHWUSxIxYcY%252fltyp6bnMrankPAnpChbWQmk95rKsUz8tqtLjNDclK1y1FLy%252fh7sed9duxDDFupXnhmXxGJOmUV6FG1arxXL8urm1F98thG8anfchv3DafKsyVHHgmdUFNH6Uhcu4sB8fo0kqm2y7IWS96w5BeG334JvnFDJPLDPvtK5ojeXfDXh%252boKJdBxXGC9NmPwgDp8XeOavQnNlJRfUAXkhukdjDg1EHGF%252b9luUuTH%252fEbKHniTzx4OvIWUnDvXcdpuEIAnW8mDJzMXpmxpl3nwtTqeQWMeSNzjute9yTZEU%252beQk498EMyU%252fuPUg%252fSOH5r%252fwjGCsPpm%252f%252bUA00SsNvWuDD0AbNIKYubFuNKQ3SX6N7M11wOksoUG%252fz9IheWtOawwl7F0lqN3xkTQhfiiHovdudAPiB%252fzt25Im27XxPQ9s1c%252bnOWOPh6m%252bvaCQcj6bcwkFbNl5Y1KL7XQvirYSFsNXnrYuQvTPMk1n5CRq6dxsl9FRGV9MMdrZduC%252bG4B0zxLA58d8fTW2zfEXnRcMTgQKLK%252fmeZT7K3wwAvQiA%253d%253d%3B%20expires%3DWed%2C%2009%20Oct%202024%2014%3A05%3A23%20GMT%3B%20path%3D%2F%3B%20SameSite%3DNone%3B%20secu
2024-10-07 21:28:38 +02:00
Class
no
Graph
Suspicious
  • Yara
https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA..
2024-10-07 21:20:13 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 0%
file.exe
2024-10-07 21:18:05 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 53%
order2024-10-07_174915.exe
2024-10-07 21:17:09 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-07 21:17:06 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Vidar
AV: 0%
WiTqtf1aiE.exe
2024-10-07 21:17:06 +02:00
Info
Class
Malicious
  • Suricata
HTMLPhisher
AV: None
https://s.craft.me/yB5midhwwaHUPW
2024-10-07 21:15:13 +02:00
Info
Class
Suspicious
no Icon
Nolandhealth.html
2024-10-07 21:09:29 +02:00
Info
Class
Malicious
HtmlDropper
AV: None
https://t.dripemail3.com/c/eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJkZXRvdXIiLCJpc3MiOiJtb25vbGl0aCIsInN1YiI6ImRldG91cl9saW5rIiwiaWF0IjoxNzI4MzA1Mzk4LCJuYmYiOjE3MjgzMDUzOTgsImFjY291bnRfaWQiOiIyNzYyNjA5IiwiZGVsaXZlcnlfaWQiOiJpeHI5d3pqeGcwZnI2NGJjbGwycyIsInRva2VuIjoiaXhyOXd6anhnMGZyNjRiY2xsMnMiLCJzZW5kX2F0IjoxNzI4MzA0MzU0LCJlbWFpbF9pZCI6OTk2Mzg3MCwiZW1haWxhYmxlX3R5cGUiOiJCcm9hZGNhc3QiLCJlbWFpbGFibGVfaWQiOjM5NTM4MjUsInVybCI6Imh0dHBzOi8vZGFpbHlhbGFza2EuY29tL25ld3M_X19zPWw5bzljOTZzbG8xZjF3aGFiODZrJnV0bV9zb3VyY2U9ZHJpcCZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TcHJpbmcraGFzK3NwcnVuZyslRjAlOUYlOEMlQjEifQ.HIDfaWGNVn-TCtUT4qZNHq7EdymoLEqvVA8XxZBU8z8
2024-10-07 21:06:33 +02:00
Info
Class
Clean
https://shared.outlook.inky.com/link?domain=urldefense.proofpoint.com&t=h.eJx1VE2TokgQ_SsTHjytNlWIwkQYOzYCYgu0DPJ1MaoK0MLiQ0ARNva_L_RMbMQe9pj5Xr18mRlZf00eFZt8_za5Nk1Zf397G8IoTuK8judlVRRJWdC8mZMie3vCEfzzsf6izvjN-dzMo4qWcYYo40fOmZzjbn_FGqEW3eunXgcm3UvzMRl5xzF5C337Gfk6Pcj7kvDGmGswFJ5YYxyS9VrPTRBQfalnNos0CRAm1cgTKp22FHkqp6fFy-z1hdFvgNHfFoPOI8gCaqUKb6SX3tieesu51HqmpgGUAM7tBH3V1juzDzoz3QijVqi5NfJDRnL2G9-X8U4XIr68xxppw1yHprZPsdZ2pBt92U8E3cdQnyL_2ll-tET5NTe0cNC0aQBftZEbY1996Ak3H_7HK2f0J27AGPbUEqtSGcr60nJu0OgvvCEPfjxwRd7rGmQv5vO2QLTT6EkmmXQNNfNK-CP9972mUqy5v3ynhmA6xsJIT4NHt8PyOLsrF-3ee4uKz1Ab-Ds2LEXtEVQew0yaAxRYxBszQfWB1H96rYB7llpO2GNNfIWpyqOhgrUNq33uctiVesy7XQBPUrgbtiaHINJAgj33hny3-fTcJvBY_ZubBh5ohzjHKXDIwMcZqQa9_oM3W5K7j7CrmZ1umHUKmKUY7JgqNDnOd_p2aEgz3XwGt47cnJzFPTR395USdVlxUO5PdyP6r_D9JPbiNFpvW0NFxylZxw8trBuCnC1jT5oppohXqV-1dyuZPYXNWY7KS-4mlBrGtFrP5PTdjVackcOsW7LtrN3FYJVoqUp6QVw5pKZKdMgWG7CZZutSWYVn72XL1VIPPznS3PdK2X2Ih7YEbSJTHFmzQ2t-XKpE1Q7OSrnAy_IwU8m96mK7taf1-uxc8YG39c9Y9kAc_oTO7O452dnlbknxuti-hhsWi_6W3qbxevLHt8ltPEhSx7O6SJoWVfEbQ6gq8h81zZKiyoqGFvnXTUK8kCIgAgkmCVhilPArDkKeB6LASclCfAMrKPKQlwQw58GoHY_at4rWDfrB4rjOUHWLm5IhEo-KIyUaKf-DNeNnAf_-BzNqawQ.MEUCIQCT_pTbYJhksnp0sPqHwITESTUbihwQiCbcBN0uoZlJ8gIgMGB7Lr80mfhFkbtGBN1ItWmyLKOQBHp2Dl327Aq4eeo
2024-10-07 21:00:15 +02:00
Info
Malicious
  • Sigma
  • Suricata
HTMLPhisher
AV: None
FW_ _EXTERNAL_ Completed_ iNH9Y_Contract_and_Agreement_3509750318S REF ID_iNH9Y.msg
2024-10-07 20:57:32 +02:00
Info
Class
Clean
SO22050.pdf
2024-10-07 20:49:29 +02:00
Info
Malicious
  • Yara
Credential Flusher
AV: None
file.exe
2024-10-07 20:45:05 +02:00
Info
Class
Clean
http://iframe.arkoselabs.com
2024-10-07 20:40:38 +02:00
Info
Clean
http://www.vyvod-iz-zapoya-rostov16.ru/
2024-10-07 20:35:24 +02:00
Info
Malicious
  • Yara
  • Suricata
Vidar
AV: 0%
out.exe
2024-10-07 20:34:04 +02:00
Info
Class
Clean
https://login.pwc.com/identity/needHelp?
2024-10-07 20:30:23 +02:00
Info
Clean
https://pcbuildsjax-my.sharepoint.com/:f:/p/ac/Eg2jLJJF1BFHuuCppZjY6=%20NkBf-6-6WBwAZaez182gRayxA?e=3DUtcUU4
2024-10-07 20:29:00 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column