top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC
AV: 42%
lHHfXU6Y37.exe
2024-10-08 05:47:06 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 18%
file.exe
2024-10-08 05:26:08 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 17%
file.exe
2024-10-08 05:26:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
FormBook
AV: 29%
Products Order Catalogs20242.exe
2024-10-08 05:26:08 +02:00
Info
Class
Malicious
  • Yara
Metasploit
AV: 84%
Bzw4UJiXNj.exe
2024-10-08 05:08:06 +02:00
Info
Class
Clean
https://www.bing.com/ck/a?!&&p=4ed30224ac809bc0JmltdHM9MTcyMzQyMDgwMCZpZ3VpZD0zNjRmNjVlOC1lNTZjLTYxOWQtMTI1Ny03MTNlZTQyYTYwMTImaW5zaWQ9NTE0MQ&ptn=3&ver=2&hsh=3&fclid=364f65e8-e56c-619d-1257-713ee42a6012&u=a1aHR0cDovL3d3dy40NDQzMTcuY29tLw#aHR0cHM6Ly9nWmV2UC5jYXN0cmFnb3VzZS5jb20vZnpGQS8=/
2024-10-08 05:07:40 +02:00
Info
Malicious
  • Yara
  • Sigma
Stealc
AV: 45%
SKGOzZRZGX.exe
2024-10-08 05:03:04 +02:00
Info
Class
Malicious
  • Sigma
SteamCleanz Marlborough Limited.xlsx
2024-10-08 05:02:39 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Njrat
AV: 87%
699rYWjtp9.exe
2024-10-08 05:02:08 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
MicroClip, Vidar
AV: 88%
7AeSqNv1rC.exe
2024-10-08 04:58:07 +02:00
Info
Class
Clean
  • Sigma
378_IA_01_Report1_Honeypot.docx.doc
2024-10-08 04:49:04 +02:00
Info
Clean
  • Sigma
CyberSafe_MailShield_Report02 (1).docx.doc
2024-10-08 04:45:08 +02:00
Info
Suspicious
http://liro-hill.com
2024-10-08 04:38:55 +02:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 16%
file.exe
2024-10-08 04:36:05 +02:00
Info
Class
Clean
http://liro-hill.com
2024-10-08 04:34:54 +02:00
Info
Clean
1-Slide Presentation.pptx
2024-10-08 04:34:14 +02:00
No classification & info
no
Graph
Malicious
AV: 37%
z52PaymentSlip.exe
2024-10-08 04:31:08 +02:00
Info
Class
Malicious
  • Yara
Metasploit
AV: 92%
NXK7tvxiAh.exe
2024-10-08 04:28:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 34%
PO# EB202329720241007_Hardy_Process^^^^.pif.exe
2024-10-08 04:27:06 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC
AV: 44%
j8zJ5Jwja4.exe
2024-10-08 04:23:10 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column