top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Suspicious
https://d22xf2qtjwaix4.cloudfront.net/fcs/configureHtml/share/facebook.php?title=Check+out+this+custom+Vans+shoe&image=http://goo.gl/Felnhz&description=I+made+this+custom+Vans+Slip-On+shoe.&url=https://minbv.shop
2024-10-24 16:16:53 +02:00
Info
Clean
  • Sigma
Mortgage Calculator and Comparator.xlsx
2024-10-24 16:16:43 +02:00
Info
Clean
  • Sigma
al arts).msg
2024-10-24 16:15:12 +02:00
No classification & info
no
Graph
Clean
no Icon
sh4.elf
2024-10-24 16:14:08 +02:00
Info
Clean
https://redagricola.us10.list-manage.com/track/click?u=e76d83ce461e16177719f298f&id=44797be5f2&e=9d16e18626
2024-10-24 16:14:08 +02:00
Info
Malicious
  • Sigma
AV: 63%
65567 DHL 647765656798860.exe
2024-10-24 16:11:07 +02:00
Info
Class
Malicious
  • Yara
AV: None
https://t.ly/8Lgfk
2024-10-24 16:09:01 +02:00
Class
no
Graph
Clean
https://na2.docusign.net/Signing/EmailStart.aspx?a=c9ecb8ea-b2b1-44a6-a484-9d091a5893cc&etti=24&acct=5a1b9816-6da5-4df9-bd97-2117ae60a146&er=1c061c54-2a9a-4176-bd31-3d7a21945a0e
2024-10-24 16:08:34 +02:00
No classification & info
no
Graph
Malicious
  • Suricata
HTMLPhisher, Mamba2FA
AV: None
https://chiquitzinbb.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPWQxbDZOVGc9JnVpZD1VU0VSMTYxMDIwMjRVMTExMDE2NDc=N0123N
2024-10-24 16:03:27 +02:00
Info
Class
Suspicious
https://cdn.discordapp.com/attachments/1238968627324125338/1298909870246072383/7_pending_messages.pdf.z?ex=671b4795&is=6719f615&hm=4dd19baf712a8440a7d8049efbd9c477b434a409fa213dececb065adf64ee0b5&
2024-10-24 15:59:04 +02:00
Info
Clean
https://check-tl-1.azurewebsites.net/
2024-10-24 15:57:26 +02:00
Info
Malicious
  • Yara
  • Suricata
Stealc
AV: None
is65NMeWkV.exe
2024-10-24 15:56:05 +02:00
Info
Class
Clean
https://www.desmos.com/
2024-10-24 15:51:41 +02:00
Info
Malicious
  • Yara
Gafgyt, Mirai, Okiru
AV: 39%
no Icon
vkjqpc.elf
2024-10-24 15:47:08 +02:00
Info
Class
Clean
https://drive.google.com/file/d/160fgQ-GsS5h0vVn8gfqfwCgc1aUt1fT3
2024-10-24 15:44:13 +02:00
Info
Malicious
  • Yara
Gafgyt, Mirai, Okiru
AV: 53%
no Icon
vqsjh4.elf
2024-10-24 15:42:07 +02:00
Info
Class
Malicious
  • Yara
Gafgyt, Mirai, Okiru
AV: None
no Icon
jwwofba5.elf
2024-10-24 15:39:16 +02:00
Info
Class
Malicious
  • Yara
Gafgyt, Mirai, Okiru
AV: 39%
no Icon
qkehusl.elf
2024-10-24 15:39:13 +02:00
Info
Class
Malicious
  • Yara
Gafgyt, Mirai, Okiru
AV: 47%
no Icon
vqkjf64.elf
2024-10-24 15:39:11 +02:00
Info
Class
Malicious
  • Yara
Mirai, Okiru
AV: None
no Icon
vwkjebwi686.elf
2024-10-24 15:39:11 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column