top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
AV: 39%
no Icon
Constate
2024-10-21 12:11:58 +02:00
Info
Class
Malicious
  • Yara
HTMLPhisher
AV: None
https://www.childkorea.or.kr/bbs/link.html?code=alarm&number=3064&url=https://form.jotform.com/242923371946059
2024-10-21 12:06:45 +02:00
Class
no
Graph
Malicious
  • Sigma
AV: 2%
at.zip
2024-10-21 11:57:44 +02:00
Info
Class
Clean
https://url.za.m.mimecastprotect.com/s/5TKkCxGjyxhJlgyDQh8f4FyCxk0?domain=viewer.grandtransfer.io
2024-10-21 11:57:27 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
GuLoader, Snake Keylogger
AV: 11%
FACTURA RAGOZA.exe
2024-10-21 11:54:59 +02:00
Info
Class
Clean
https://eu.docusign.net/Signing/EmailStart.aspx?a=282f8be7-f0da-4f2d-ae22-4f00b0ed1117&etti=43&r=04bd4ca4-2771-46aa-b9e0-2ac24c9a604a
2024-10-21 11:51:15 +02:00
No classification & info
no
Graph
Suspicious
  • Sigma
email.eml
2024-10-21 11:49:55 +02:00
Class
no
Graph
Clean
https://daiichi-sankyo-login-drive.com.ghgfqjlgshwkznds.com/appc8a7ad9c16751e6045c5715759610b27/670422c2413ae6bc7d620322
2024-10-21 11:39:42 +02:00
Info
Clean
https://idp.iso.org/realms/ws-iso/login-actions/action-token?key=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI0NDY2Yzc5YS02MmUwLTQzY2MtYjBiOS00MWE5YjA3MzgwZGQifQ.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.m3dBRyLjxBBLyKNqvA6_nLq6xD0BmtLNcj7Fx46baRg&execution=9eb99f14-82f8-4818-95c3-4eddf0e60cf3&client_id=ui&tab_id=iH1eyhkjESw
2024-10-21 11:38:22 +02:00
Info
Malicious
  • Yara
AV: 24%
SecuriteInfo.com.W32.PossibleThreat.17916.5400.exe
2024-10-21 11:38:07 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-21 11:36:06 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 50%
file.exe
2024-10-21 11:36:06 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 63%
ekte.exe
2024-10-21 11:36:06 +02:00
Info
Class
Malicious
  • Yara
FormBook, PureLog Stealer
AV: 29%
Ot7EdLwo881ajbV.exe
2024-10-21 11:28:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
DarkCloud
AV: 81%
Payment-Inv.exe
2024-10-21 11:28:09 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
GuLoader, Snake Keylogger
AV: 12%
Purchase Order.exe
2024-10-21 11:28:06 +02:00
Info
Class
Malicious
  • Sigma
AV: 32%
Technical Datasheet and Specifications_PDF.exe
2024-10-21 11:28:06 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AV: 71%
IND24072113_1.xlsx
2024-10-21 11:27:06 +02:00
Info
Class
Malicious
AV: 38%
https://s3.us-east-2.amazonaws.com/revealedgceconomies/vdiq197yvi/ImgBurn_822881.exe?
2024-10-21 11:24:03 +02:00
Info
no
Graph
Suspicious
RazerSynapseInstaller_V1.19.0.635.exe
2024-10-21 11:20:39 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column