top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 83%
file.exe
2024-10-24 04:56:06 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 58%
file.exe
2024-10-24 04:56:06 +02:00
Info
Class
Malicious
AV: None
https://t.co/yXelyYqHRk
2024-10-24 04:55:51 +02:00
Info
Malicious
HTMLPhisher
AV: 3%
http://jedox-couriers.com/5g/domain.php/domain..html?#infoland@hdel.co.kr
2024-10-24 04:46:23 +02:00
Info
Class
Suspicious
http://www.mkrad.com
2024-10-24 04:34:26 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Socks5Systemz
AV: 8%
1iGYsIphmN.exe
2024-10-24 04:31:05 +02:00
Info
Class
Malicious
  • Suricata
https://linkednnn.weebly.com/
2024-10-24 04:28:59 +02:00
Info
Class
Clean
  • Yara
x-manager_v3.2.16_build98_install.exe
2024-10-24 04:27:18 +02:00
Info
Class
Malicious
http://doddyfire.linkpc.net:10000/
2024-10-24 04:22:21 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 83%
file.exe
2024-10-24 04:00:11 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 17%
file.exe
2024-10-24 04:00:08 +02:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-24 04:00:08 +02:00
Info
Class
Malicious
  • Suricata
HTMLPhisher, Mamba2FA
AV: 0%
https://chiquitzinbb.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPWQxbDZOVGc9JnVpZD1VU0VSMTYxMDIwMjRVMTExMDE2NDc=N0123N
2024-10-24 03:39:50 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
GuLoader, Snake Keylogger
AV: 22%
Adeleidae.exe
2024-10-24 03:38:24 +02:00
Info
Class
Malicious
HTMLPhisher, Mamba2FA
AV: 0%
https://chiquitzinbb.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPWQxbDZOVGc9JnVpZD1VU0VSMTYxMDIwMjRVMTExMDE2NDc=N0123N
2024-10-24 03:29:49 +02:00
Class
no
Graph
Clean
https://email.sg.on24event.com/ls/click?upn=u001.7kf5QUY4LGF7Fzt7LGE4bbPPsSPtBC4KXSPVJqWhtiGLsUMgvu49HZQe-2Bzh6sjt9ybZ9vVl9bgQACfpZ9kpsBAmtsV4HSvSu9lftga7l7gV5lWhUfn2hVFfAcv3XKyi59wIkSDgg8UQpdQiuRhmwwC-2FmjJ5JepRiZZAM8yvCWag-3DHYji_viv87QBHgf3cZPYRGDRhIXa6hoPcia8Vp9LLw3LpuBGLsuHi99W62OlSEG2wms8Lef0n3BdPyo2jMn0DcSaAncJDJ-2FUJYKiMQjVdIyYXME3PwZkaUAhY3w8ZdadKXO-2F4Q7Yn-2B4FWCfA2thlySPyh9zwKw16Uk3NmFfkNhdG0Fgw0Y0UzbQ-2Fv57irikneHNB2hswIPVHMknU-2FBxQW3h42Yyu5Jym85X4w1-2FHRy88WRnXz4HydJUMG-2Fbkypo-2FkWsMGGZPdghwzHlJF3HgUlpO-2FBGEMWgVrkKaihwaw00hwGDvnuSdWqDG0lYALa0yuWqyF6XQpmjojEIkqUqV3S0qUUg-3D-3D
2024-10-24 02:56:10 +02:00
Info
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-24 02:49:07 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: 22%
file.exe
2024-10-24 02:49:07 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 53%
file.exe
2024-10-24 02:49:07 +02:00
Info
Class
Malicious
AV: None
file.exe
2024-10-24 02:48:06 +02:00
No classification & info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column