top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
http://account.booking.com
2024-11-25 16:37:43 +01:00
Info
Suspicious
http://52.209.78.88/raphael_data_v8
2024-11-25 16:32:42 +01:00
Info
Malicious
AV: None
http://esaleerugs.com
2024-11-25 16:31:45 +01:00
Info
Clean
  • Sigma
FW EXTERNAL Payment Status - Open Balance - Alard Engineering.msg
2024-11-25 16:30:57 +01:00
Info
Clean
https://res.public.onecdn.static.microsoft/assets/mail/file-icon/png/pdf_16x16.png
2024-11-25 16:30:57 +01:00
Info
Clean
https://url.us.m.mimecastprotect.com/s/nlFaCM8XJrFnjO2skhVH81eHU?domain=bizcreditservices.sharepoint.com
2024-11-25 16:30:57 +01:00
Info
Clean
ResumeKR.pdf
2024-11-25 16:30:17 +01:00
Info
Clean
http://Plotting@scantechgraphics.com
2024-11-25 16:25:30 +01:00
Info
Malicious
  • Yara
  • Sigma
GuLoader
AV: 3%
ORDER AND CATALOG 01.bat
2024-11-25 16:22:29 +01:00
Class
no
Graph
Malicious
  • Yara
Credential Flusher
AV: 34%
file.exe
2024-11-25 16:21:09 +01:00
Info
Class
Malicious
AV: 42%
file.exe
2024-11-25 16:21:09 +01:00
Info
Class
Incomplete analysis
AV: None
http://greatlink.com
2024-11-25 16:20:28 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Stealc, Vidar
AV: 39%
file.exe
2024-11-25 16:20:08 +01:00
Info
Class
Malicious
  • Suricata
AV: None
file.exe
2024-11-25 16:20:08 +01:00
Info
Class
Clean
ORDER AND CATALOG 01.7z
2024-11-25 16:19:23 +01:00
No classification & info
no
Graph
Clean
Spud.exe
2024-11-25 16:15:52 +01:00
No classification & info
no
Graph
Clean
https://taxprofessionals-status.hostedtax.thomsonreuters.com/subscriptions/confirm/KDRivuRIqSqg5XSi
2024-11-25 16:15:10 +01:00
Info
Clean
https://www.ketanrode.com
2024-11-25 16:13:05 +01:00
Info
Clean
https://sales.officedepot.com/t/105675/c/7b86b7d5-29ac-47cf-94e4-73c36356a9fa/NB2HI4DTHIXS653XO4XG6ZDQMJ2XG2LOMVZXGLTDN5WS6===/www-odpbusiness-com
2024-11-25 16:12:00 +01:00
No classification & info
no
Graph
Clean
https://www.docusign.net/Signing/EmailStart.aspx?a=b2d11f37-8b51-49fc-ad6d-1a487cf152d6&etti=24&acct=3be16a41-04a7-4c57-9fcc-ddbff611486e&er=21d19b35-85f2-4141-b943-db2cccac3169
2024-11-25 16:10:07 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column