top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
Lokibot
AV: 25%
Shipping Documents WMLREF115900.xls
2024-10-24 08:38:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 18%
A & C Metrology OC 5457144.xls
2024-10-24 08:38:06 +02:00
Info
Class
Clean
https://www.dropbox.com/l/scl/AADlgaSe75Ymv3w7b2b1uiQyOAeuV6ef1k0
2024-10-24 08:37:51 +02:00
Info
Clean
https://email.sg.on24event.com/ls/click?upn=u001.7kf5QUY4LGF7Fzt7LGE4bbPPsSPtBC4KXSPVJqWhtiH5YWlLQDXySMSlctC0cMUUVd-2B47F7Ttqa2NdTOald7M8lT94Y51jIxBSBzTpATANXP9y3nAYbgxtLZlkJceXzJoudX0mLCiECpAHzvBX6pnhdFdhzXubiEfd0rIDTFHqj19McBatRbMhE4dgrsY5-2FgJwznbwcj1o9jL2m6mK6oT5uhi8X9yRDR4d0Z6NhgcfHxzvB2Oqk1KMuuZSjLzDRUzdkhj1U6Xt
2024-10-24 08:37:16 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 63%
NK3SASJheq.exe
2024-10-24 08:37:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Socks5Systemz
AV: 34%
hAyQbTcI0I.exe
2024-10-24 08:37:06 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Amadey
AV: 58%
msqT9atzYW.exe
2024-10-24 08:37:06 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Stea
AV: 83%
g4Cyr2T5jq.exe
2024-10-24 08:36:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AV: 74%
n3GMxqBnUE.exe
2024-10-24 08:36:05 +02:00
Info
Class
Clean
https://email.sg.on24event.com/ls/click?upn=u001.7kf5QUY4LGF7Fzt7LGE4bbPPsSPtBC4KXSPVJqWhtiHjX8DoCw-2F6wUeQ27RvG2-2F-2FyOCUgAe-2BapJJCrwiDoubXwxmIHQZ2do2nzugRpbj8sWUY9cLBSkLNl0QOsQhRSi1zvMya46X7tlLUJv10eDr6e03Gt94WaE45RxiQNsUhLUvBlQvstz4lsFTpt1iHgyHMLb-2FULH-2BKG4s6J1Dm42fxw0-2BXth-2Fbrjs6t8h42i9p23xHaMeYHZZZLgXq3tV0yWAr7uV_b-2BTvzGoCot69w5CrUH-2FS1Y-2FtHpOqUe5Tde2CA1VIo0PHMLtBpwTjW-2B3ez0JDqpgulOBb-2BAC2rARvB9iGHIXFa5RZcTUQZFc35R8ql2TehP86yFFkCp-2BUUvhzPKc1Rzj8vg-2FlIpu1mzlzKpkUzgADQW83F-2BkmamLFxD3pBB5Y8fb5amltgfONUEqq1D4KdoPzgZ2pvl10nd2KoyH1CRTES7zIMtWSl1JBBk2B-2BsK9izcDP-2BHogj9IAOv3d44PsqiC2Z5JkoOO5oY2M-2BqtYFUyqBmomEzUYHRW9Kymc47UQnRGLtUFGuvEzuyEewpJBzb0JiWUpzVX9Ku7zPRnHAWIIA-3D-3D
2024-10-24 08:24:39 +02:00
Info
Clean
message_v2.rpmsg
2024-10-24 08:19:05 +02:00
No classification & info
Clean
  • Sigma
D. Bayham, Group #0070302, and Claim #7270930 - Support to Max.eml
2024-10-24 08:19:05 +02:00
Info
Clean
https://go.microsoft.com/fwlink/?Linkid=844050
2024-10-24 08:19:05 +02:00
Info
Clean
https://outlook.office365.com/owa/?viewmodel=ReadMessageItem&InternetMessageID=%3cYT2PPF15C092F3DA27DCB1DFFA84E9A9321F14D2%40YT2PPF15C092F3D.CANPRD01.PROD.OUTLOOK.COM%3e
2024-10-24 08:19:05 +02:00
Info
Clean
https://outlook.office365.com/Encryption/lock.png
2024-10-24 08:19:05 +02:00
Info
Clean
https://email.sg.on24event.com/ls/click?upn=u001.7kf5QUY4LGF7Fzt7LGE4bbPPsSPtBC4KXSPVJqWhtiFM8zSEn6-2B3gb8wmiLScS1OVRzLJQkKJT2x-2BlkVLBo4VPFoKHBWjpFvyTrJb-2F7tvvdg-2BfrANq2tQCswtFR3p-2B1puWRtkKxtgLaaskTB8B065pYtFcO8eqfkQSVXtl0Yvi0-3DD4vt_565zJS5R-2Fw0pK-2F2xng-2FPIjoC1uZCMk7KDsGIFFxjJtMvPaDIFy-2BcI1HsjQiW2yI1kn6H-2B2BpgAMKwDWFEA77Ul-2FXHVmzTaDKHj4mdtEHl3B0qbVp8pH9GjYZMNmx42K9SJ5dDCJXkXBpamRGRpJQUmjAPxQFXCNfCEXnGoyubG17dV3-2BX-2FHziO-2FZ70JkzAlwG3kWjKXObINL7vMIBT-2F1-2F-2Bq-2BnAJ7iAT0-2F6fdUKQCoNqkNvEjQ9WPCHvraWwXFSOjWqlx-2F9qJdrzXpNbht8AiZE6GbD1fSY1eyzS56vGyKD4aF9Fi0M5xZrZnqtbjn6rLBE0g74XqY3KI8fiCcYuRXA-3D-3D
2024-10-24 08:16:34 +02:00
No classification & info
no
Graph
Malicious
  • Yara
Mirai
AV: 64%
no Icon
na.elf
2024-10-24 08:07:04 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook, PureLog Stealer
AV: 66%
Order.exe
2024-10-24 08:00:06 +02:00
Info
Class
Malicious
AV: 66%
autorun.inf
2024-10-24 07:59:13 +02:00
Info
Clean
https://email.sg.on24event.com/ls/click?upn=u001.7kf5QUY4LGF7Fzt7LGE4bbPPsSPtBC4KXSPVJqWhtiHjX8DoCw-2F6wUeQ27RvG2-2F-2FyOCUgAe-2BapJJCrwiDoubXwxmIHQZ2do2nzugRpbj8sVCMJVwfRcB6tXSsKkfqWw5xdCxBaAGT6XJhp46wpdP-2B5jHjivpZxzYsrSRXA5-2FY-2B8UvWir66G9dE176cw1g-2BPqKVkkh9E5WeWJPLCBn1l8H8WPwQ1UzgOnlb4X9-2BDO4tMqlo8ADTgxcxXqZxIy
2024-10-24 07:57:14 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column