top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
HTMLPhisher
AV: 2%
https://www.kwconnect.com/redirect?url=https://www.lugiest.com/sqx/#Xem9lLmdyYWhhbUBjeWJnLmNvbQ==
2024-10-14 09:10:23 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
GuLoader, Snake Keylogger
AV: 27%
Snvlerier.exe
2024-10-14 09:10:19 +02:00
Info
Class
Clean
https://pme.bges-group.co.uk/
2024-10-14 09:07:31 +02:00
Info
Clean
UemxXC3jyR.exe
2024-10-14 09:07:00 +02:00
Info
Malicious
https://productlab.groupe-rocher.com/Advitium/login.asp
2024-10-14 09:04:01 +02:00
Info
Class
Clean
  • Sigma
Handling påkrævet..msg
2024-10-14 08:57:50 +02:00
Info
Clean
https://s3-eu-west-1.amazonaws.com/templates-media/EmailTemplateSources/Telmore/00_template2017/fill2.png
2024-10-14 08:57:50 +02:00
Info
Suspicious
https://url12.mailanyone.net/scanner?m=1t0Dqs-000000001mw-3EUh&d=4%7Cmail%2F90%2F1728884400%2F1t0Dqs-000000001mw-3EUh%7Cin12l%7C57e1b682%7C21208867%7C12850088%7C670CAF5226A69F31F09C33774F93F45E&o=%2Fphto%3A%2Fgtsmeogaco%2Fl.msmpnpie%2F%2Fertasthrbo%2Ftp.&s=19seH-RJRVXD_W3b1eqm1lU_x4k
2024-10-14 08:57:50 +02:00
Info
Class
Clean
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitbKNJ8sYhqlUJYn8yxhWxUA0aJZmY5LVQXtJ_ILTKZZwpaQtRjD_bBhVgez8biuF2oIY1eZ6WWCPDhA-HKNrtaRy0MDNWSYSymAkryTIqgcDmTiUiHO7r7NP2_08OxpqkX5MapWuII64_U3TZwW5nKAxcsmE6qeQ00TkEHz0my6QqYxJ23n8rP2tHtwSf/s1600/jIYQCsK6.png
2024-10-14 08:57:50 +02:00
Info
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-14 08:57:05 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 43%
file.exe
2024-10-14 08:56:04 +02:00
Info
Class
Clean
https://eu.yourfavouritedocs.com/?cid=48125&pageid=7633&lang=it&x-srvc=YourFavouriteDocs&gbraid=0AAAAA9_Nmptv9mh2wjEK8OLNLeQiYlwyG&creative=711093308364&network=d&placement=www.latuadietapersonalizzata.it&keyword=&adgroup=170803571248&device=apple%2Biphone&gad_source=5&gclid=EAIaIQobChMI-YbLioDziAMVVYuDBx3F4yCiEAEYASAAEgL-oPD_BwE
2024-10-14 08:55:49 +02:00
Info
Malicious
https://tracking.ei9ie7ph.com/aff_c?offer_id=14263&aff_id=2&source=testoffer&aff_sub=testoffer
2024-10-14 08:55:34 +02:00
Info
Clean
https://segaeuropeltd.box.com/s/pi7t6sl7x1f01fcfzv0wj8ltydx3qfyk
2024-10-14 08:54:09 +02:00
Info
Clean
Muffenrohr Tiefbauh., Zahl.-Erinnerung KD2016680.PDF
2024-10-14 08:51:32 +02:00
Info
Suspicious
https://forms.office.com/Pages/ResponsePage.aspx?id=IFlAaXO2fE-IReEk6dCK8oXJBkKKoBZPtujagCihfl1UNzFaTTZPSkRVSlI2V0ZETUxBNkNCOVhMUy4u
2024-10-14 08:34:46 +02:00
No classification & info
no
Graph
Malicious
https://itbm.egnyte.com/dl/D0z39LyNGq
2024-10-14 08:33:34 +02:00
Info
Malicious
file.exe
2024-10-14 08:32:05 +02:00
Info
Class
Clean
jZBSswQjhQ.exe
2024-10-14 08:31:08 +02:00
Info
Malicious
  • Yara
Credential Flusher
AV: 37%
file.exe
2024-10-14 08:31:05 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column