top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
Mirai
AV: 66%
no Icon
boatnet.m68k.elf
2024-11-01 05:07:11 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Gafgyt, Mirai
AV: 47%
no Icon
armv5l.elf
2024-11-01 05:07:11 +01:00
Info
Class
Suspicious
no Icon
zone.mips.elf
2024-11-01 05:07:11 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Credential Flusher
AV: 47%
file.exe
2024-11-01 05:01:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
LummaC, Amadey, Cryptbot, LummaC Stealer
AV: 79%
file.exe
2024-11-01 05:01:09 +01:00
Info
Class
Malicious
AV: 37%
file.exe
2024-11-01 05:01:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 96%
file.exe
2024-11-01 05:00:07 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 21%
file.exe
2024-11-01 05:00:07 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Quasar
AV: 60%
Xp7zCcGiGj.exe
2024-11-01 04:48:05 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Snake Keylogger, VIP Keylogger
AV: 32%
2Lzx7LMDWV.exe
2024-11-01 04:48:05 +01:00
Info
Class
Suspicious
no Icon
zone.mipsle.elf
2024-11-01 04:47:05 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
AsyncRAT
AV: 87%
g5tO58gHku.exe
2024-11-01 04:43:06 +01:00
Info
Class
Suspicious
  • Sigma
  • Suricata
Your_Shipment_is_On-Hold_#aHout.eml
2024-11-01 04:39:13 +01:00
Info
Clean
http://url4388.parishsoft.com/wf/open?upn=u001.SZFbf5rjatL1CasYqpYXDjbM-2FDtikOlSo2tuOY4QKbeo6IDmrNN4PhKzrlyM4gBBJFmDKIeenjrfPCcojU0GbWnqwjDhLOqEayRWo6-2Fd4J2y-2B2jKmag-2FAS5wgjSaZPoMm-2B2MBoEK-2BWxbj634-2FjZ4fbwYSAQhodJNsY2780FtQdmAzVVE-2BhQPIORe0TTTt7YZLy-2FZgAaTgqSvkU5joxsp6QNGoY8DilYk2zJLQmtNu3-2Bkr8Uz-2BIEpb48ACD9keYiAK11NDYSPddAykFql8lK6qYbrtBWcDPflnC4j4id97bnSHR6e6K2Lwik-2BTljHskLQxvzTXTKwlcKJYohOqzGQX8qxeLEi6noz0Prp9kwmJJg-3D
2024-11-01 04:39:13 +01:00
Info
Clean
http://url4388.parishsoft.com/ls/click?upn=u001.Vpzjdhwu4OAeGaWRMrv2bB-2B5OkVkzutkycdE1fwyJlP6-2FEbwebnwYYoHfXbZ-2FHguQFRJvedngE2ezSyUNSEpEw-3D-3DOqA9_Ei0lB4A-2FSXbmPOtpkONKi-2FJsAiHev6HUIzFIQm9jEqCtjZJVlOxAJaWoVZIV3nysR5XkFFC8o3Jh0mQEVRkFbu8CNNolg6hNhpTLRCnvKjBnBTmrK3i-2FpTCnzcaYGLoAwBwyLY4U-2F-2F4lQImYv-2FVxKC8sJ4cUcxo1N5jyMBrEkSJVkOJqcAsp4P5zv1nTrzlcjPqiSXv8GLO8FZxTLy2FeN5TjQtkGV1Kfz7a7J4lIVUWBXLrtqk-2FbbiXlmNXT8hB4uB7mEMrIZAqmMhOZ5Ah-2B9qScA2D3xY1G9HtRzCtkIE78l8BnM3D-2F-2BoHcEj-2BLJPthOFvpFScbxO9ADV4uN4jncnu3cFTbUv5YOT0YZxO57w-3D
2024-11-01 04:39:13 +01:00
Info
Clean
https://shop.vogue.co.uk/cdn/shop/t/124/assets/logo-dhl.svg?v=63167229048972580801720607996
2024-11-01 04:39:13 +01:00
Info
Malicious
HTMLPhisher
AV: 1%
https://my-homepagero.sa.com/exml/
2024-11-01 04:12:33 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Credential Flusher
AV: 47%
file.exe
2024-11-01 04:09:05 +01:00
Info
Class
Clean
https://na4.docusign.net/Signing/EmailStart.aspx?a=1a00c978-a3c5-423b-af92-c2c7b20d620c&etti=24&acct=f24aceac-5d1b-4229-99d0-cf035d7a8cfe&er=dbef40c1-44b2-454d-8b64-8a9ab362d47d
2024-11-01 03:45:53 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 96%
file.exe
2024-11-01 03:44:07 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column