top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Suricata
Stealc
AV: 44%
file.exe
2024-10-01 06:56:04 +02:00
Info
Class
Malicious
  • Yara
F3dll.exe.dll
2024-10-01 06:40:05 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
Sliver
AV: 47%
Doc.exe
2024-10-01 06:38:05 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AsyncRAT, DcRat
AV: 9%
sostener.vbs
2024-10-01 06:29:04 +02:00
Info
Class
Malicious
https://www.afghanhayatrestaurant.com.au/
2024-10-01 06:25:25 +02:00
Info
Malicious
AV: 13%
file.exe
2024-10-01 06:16:06 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Snake Keylogger, VIP Keylogger
AV: 53%
invoice.exe
2024-10-01 06:15:07 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 21%
file.exe
2024-10-01 06:02:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
DCRat, PureLog Stealer, zgRAT
AV: 75%
Zn0uX5K1ez.exe
2024-10-01 05:56:05 +02:00
Info
Class
Suspicious
https://www.dropbox.com/l/scl/AABe7lwEUTsjnPynWdc5_YXXEVOhDnhzDcs
2024-10-01 05:54:33 +02:00
Info
Malicious
  • Yara
HTMLPhisher
AV: None
https://u47113775.ct.sendgrid.net/ls/click?upn=u001.NLjCc2NrF5-2Fl1RHefgLH74dDCI-2FlQUMQCuknF0akr34-3DPZ74_Bz-2FoIC9YMuvgy8ZsoekpZ-2Fn96y0OCAueT5LjwQn-2FX25AbFWdd2iGOJMfOUDymLwSDnjLWUuKOfyExMHrLPQc6sWuvBEF4PT9PwlcB-2BK9NQmoQucfLOeGSzPQg4J-2Bvn2C-2FT7DBGI3L6HQml9TPdefbzANw58o8IwtiN3AMNw21dRhcIy1JE5InQL6ZhzyniB-2FPrKB2Vn9uUJ7Mm1QrvUZh95-2FIqg1tkHnn-2FLCgLCOHUCdp1zwu5x-2Fprfv3kPHwI33RA9-2FJGY9xYPl-2BGH4uHP30vXeaFOwuVkWjx1bpQcAiato1uxhbL8AJAqpgT-2Bg5yQp7xXBACsCORIJr0VehkYFdFdFkgZPx7KSQblwloMm5OUc-2B9bb1d0siCBq5u36Pp2iCgmhq5PmipxmWr1HvrLZkdUUXJjpaRdjjEopb-2Fhw3b-2BUOpmNbUIJywjWyMBcUA9ScKtkpotTga2qo5ZaX-2B7AVyqz8KXtUfTb8SopobzuOWPiU-2BhBa8i7lRIGGQBQZmYU1TWv5mQ8uRPPf-2FWdH9RREF8cMLDET4k24yu8dJdqteeATx8Jfw8MWOWehX6ZTxJWGswooAVOvW116fDJmFNO-2F-2BecR-2Fd9NmRwCYnnK4Bh3IM-3D
2024-10-01 05:54:18 +02:00
Info
Class
Clean
http://clicks.sharefile.com/f/a/SncqrsfZOz93buaMHHZ1EQ~~/AACuKQA~/RgRo3Qm5P4Q1AWh0dHBzOi8vY2FtcGFpZ25zdHVkaW8uc2hhcmVmaWxlLmNvbS9yL2IxZTJlYWMzYjA5ZGVkZTJjMjgzMmVlYzk_Y3Q9WVRvMU9udHpPalk2SW5OdmRYSmpaU0k3WVRveU9udHBPakE3Y3pveE5Eb2lZMkZ0Y0dGcFoyNHVaWFpsYm5RaU8yazZNVHRwT2pnd08zMXpPalU2SW1WdFlXbHNJanRwT2pJM08zTTZORG9pYzNSaGRDSTdjem95TWpvaU5qWm1ZVGcwWWpjellXWTNNakUzT1RrNE5qa3lOU0k3Y3pvME9pSnNaV0ZrSWp0ek9qYzZJalkwTlRFek1EVWlPM002TnpvaVkyaGhibTVsYkNJN1lUb3hPbnR6T2pVNkltVnRZV2xzSWp0cE9qSTNPMzE5JlcDc3BjQgpm-LmE-mYhmDDJUhdTYXJhaC5BbHRvbkBhc2h1cnN0LmNvbVgEAAAG3w~~
2024-10-01 05:53:38 +02:00
Info
Clean
http://moodys-local.com
2024-10-01 05:42:35 +02:00
Info
Suspicious
$RMH4FA8.exe
2024-10-01 05:37:54 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 17%
file.exe
2024-10-01 05:32:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 0%
DHL_CBJ520818836689.exe
2024-10-01 05:26:36 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Snake Keylogger
AV: 44%
Rfq H2110-11 Order_ROYPOWTECH %100% S51105P-E01 (最新).exe
2024-10-01 05:21:34 +02:00
Info
Class
Clean
http://www.birchcreative.com.au
2024-10-01 05:15:22 +02:00
Info
Malicious
file.exe
2024-10-01 05:15:08 +02:00
Info
Class
Clean
no Icon
SecureMessageAtt.html
2024-10-01 04:57:58 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column