top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 11%
file.exe
2024-10-08 00:25:07 +02:00
Info
Class
Suspicious
https://csaconsultingservices.com/cgo/
2024-10-08 00:24:47 +02:00
Info
Class
Clean
http://generosomacaraan.com/
2024-10-08 00:24:17 +02:00
Info
Clean
https://www.onlinedesignerhandbags.uk/?bypass-cdn=1
2024-10-08 00:23:42 +02:00
Info
Malicious
AV: 96%
http://hans.uniformeslaamistad.com/prog/66f5db9e54794_vfkagks.exe
2024-10-08 00:23:11 +02:00
Info
Class
Clean
https://heroku.com/
2024-10-08 00:22:41 +02:00
Info
Clean
https://www.temu.com/cmsg_transit.html?_cmsg_biz=9010&_cmsg_channel=mail&_cmsg_locale=100~ja~JPY&msgid=100-20241001-15-B-783239451837149184-427-qj36dSf3&_p_landing=1&_x_src=mail
2024-10-08 00:22:11 +02:00
Info
Malicious
  • Sigma
AV: 8%
Player reports algnet 07-10-2024 .pdf www.skype.com.exe
2024-10-08 00:22:06 +02:00
Info
Class
Clean
http://oponaprzemyslowa.net/scripts/
2024-10-08 00:21:35 +02:00
Info
Malicious
  • Yara
Credential Flusher
AV: 16%
file.exe
2024-10-08 00:21:05 +02:00
Info
Class
Suspicious
http://www.topcreativeformat.com/
2024-10-08 00:21:01 +02:00
Info
Class
Clean
http://app.ordina-mining.com/
2024-10-08 00:20:30 +02:00
Info
Clean
https://trabahopartylist.com/
2024-10-08 00:20:00 +02:00
Info
Clean
New Vendor Setup Form (1).pdf
2024-10-08 00:19:15 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 55%
ylVAEHbMLf.exe
2024-10-08 00:19:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Xmrig
AV: 55%
h2qWqtD73F.exe
2024-10-08 00:19:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
SilentXMRMiner, Xmrig
AV: 53%
e7WMhx18XN.exe
2024-10-08 00:19:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AV: 11%
XgKnAQpuPM.exe
2024-10-08 00:19:09 +02:00
Info
Class
Clean
Usc credit Union Bank Letter- copy.pdf
2024-10-08 00:18:39 +02:00
Info
Clean
https://click.mc.renault.com/?qs=04402766a4e7e51807739a9c99903cada5daa4d8c2b79d66a73f87c77a243fe48f2e1896cd59ed79cac1b9137a0d5d7c890df6d5b8edfe2c4be323d95ad347db
2024-10-08 00:17:28 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column