top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
  • Sigma
https://customers.pressrelations.de/apps/nrx/files/stored_files/F867FA34-FAAA-EF11-84B9-D4F5EF0B30A8
2024-11-25 13:46:51 +01:00
Info
Clean
http://garnaat.org
2024-11-25 13:44:45 +01:00
No classification & info
no
Graph
Clean
https://www.voiranime.city/stro
2024-11-25 13:42:29 +01:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
  • Suricata
Clipboard Hijacker, Cryptbot
AV: 46%
file.exe
2024-11-25 13:40:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
RedLine, XWorm
AV: 58%
QLTa31hZsN.exe
2024-11-25 13:39:43 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
FormBook
AV: 61%
brief nr. 001150_51_2024-11-19_134943.docx.exe
2024-11-25 13:39:38 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 71%
Certificate 11-19AIS.exe
2024-11-25 13:39:38 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer
AV: 63%
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
2024-11-25 13:39:38 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
DarkCloud
AV: 66%
MSM8C42iAN.exe
2024-11-25 13:39:33 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook, PureLog Stealer
AV: 39%
DO-COSU6387686280.pdf.exe
2024-11-25 13:39:32 +01:00
Info
Class
Malicious
AV: 24%
y83WAR4vQc.exe
2024-11-25 13:39:32 +01:00
Info
Malicious
  • Yara
  • Suricata
FormBook
AV: 63%
FACTURA 24V70 VINS.exe
2024-11-25 13:39:32 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 61%
New Purchase Order Document for PO1136908 000 SE.exe
2024-11-25 13:39:27 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 74%
Fiş.exe
2024-11-25 13:39:27 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
FormBook
AV: 53%
LOI REQUEST.exe
2024-11-25 13:39:27 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
GuLoader, MassLogger RAT
AV: 61%
November Quotation.exe
2024-11-25 13:39:21 +01:00
Info
Class
Malicious
  • Yara
AgentTesla
AV: 68%
OC. 4515924646.exe
2024-11-25 13:39:21 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 68%
ORIGINAL INVOICE COAU7230734290.exe
2024-11-25 13:39:20 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
FormBook
AV: 76%
packing list G25469.exe
2024-11-25 13:39:20 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
FormBook
AV: 66%
Payment Advice D 0024679526 3930.exe
2024-11-25 13:39:14 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column