top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Suricata
Mirai
AV: 39%
no Icon
SecuriteInfo.com.Linux.Siggen.9999.5011.20467.elf
2024-10-13 02:49:06 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 55%
file.exe
2024-10-13 02:43:07 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 54%
file.exe
2024-10-13 02:43:05 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
statement of acct WWP.exe
2024-10-13 02:25:05 +02:00
Info
Class
Malicious
AV: None
file.exe
2024-10-13 02:18:05 +02:00
Info
Class
Malicious
  • Sigma
  • Suricata
cW5i0RdQ4L.exe
2024-10-13 01:57:07 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
CobaltStrike
AV: 84%
A1E0xfcSNl.exe
2024-10-13 01:57:05 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
Setup-Premium.exe
2024-10-13 01:43:06 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 16%
Setup.exe
2024-10-13 01:42:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
CredGrabber, Meduza Stealer
AV: None
phantomtoolsv2.exe
2024-10-13 01:37:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LegionLoader
AV: 3%
v.1.6.3__x64__.msi
2024-10-13 01:35:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
CredGrabber, Meduza Stealer
AV: 42%
OceanicTools.exe
2024-10-13 01:33:08 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
Solara.exe
2024-10-13 01:32:07 +02:00
Info
Class
Malicious
  • Yara
Python Stealer, CStealer
AV: 32%
FluxusV2.exe
2024-10-13 01:29:10 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-13 01:28:08 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-13 01:28:08 +02:00
Info
Class
Clean
https://turbocards.com//wp-content/ledt/
2024-10-13 01:17:58 +02:00
No classification & info
no
Graph
Clean
https://turbocards.com//wp-content/ledt/
2024-10-13 01:09:29 +02:00
Info
Malicious
  • Yara
  • Suricata
LummaC
AV: 53%
file.exe
2024-10-13 00:38:08 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 53%
file.exe
2024-10-13 00:38:08 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column