top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Suricata
DCRat, PureLog Stealer, zgRAT
AV: 71%
FuWRu2Mg82.exe
2024-10-30 22:31:03 +01:00
Info
Class
Malicious
  • Yara
Masscan
AV: 13%
no Icon
vmpcow.elf
2024-10-30 22:30:05 +01:00
Class
Malicious
AV: 48%
no Icon
V6QED2Q1WBYVOPE
2024-10-30 22:29:50 +01:00
Info
Malicious
  • Yara
Xmrig
AV: 63%
no Icon
tuefv1.elf
2024-10-30 22:29:06 +01:00
Info
Class
Malicious
AV: 5%
no Icon
5lg7zd.elf
2024-10-30 22:29:04 +01:00
Info
Class
Suspicious
PumpBot.exe
2024-10-30 22:22:07 +01:00
Info
Malicious
  • Yara
  • Suricata
LummaC
AV: 32%
file.exe
2024-10-30 22:22:04 +01:00
Info
Class
Clean
http://unwieldyimpulse.com
2024-10-30 22:20:16 +01:00
Info
Suspicious
https://employeesectioncom.formstack.com/forms/employeecompliance
2024-10-30 22:16:15 +01:00
Info
Clean
http://url4388.parishsoft.com/ls/click?upn=u001.Vpzjdhwu4OAeGaWRMrv2bB-2B5OkVkzutkycdE1fwyJlP6-2FEbwebnwYYoHfXbZ-2FHguQFRJvedngE2ezSyUNSEpEw-3D-3D6zL5_gNy46Vju13ZPc19Yn476aYbiCp1gykLTN1kxbuMD1uBQTSJ8Ks6vO-2BnSk9102VjocbTdNN96oGrBhXQlwpP1YPbtfMQDjSg-2Ft9OPYyoy2VUs8Cb9FajZh55EGCbRMvrh9I-2BIte04LHtkF3GuXhIVJTkCVcGk72-2Bz1jOI7r6XLGWC37Rp3V5U1j-2FtLGCrno9jPezgodjS9pERidZRFM8XouYrE1ZPXaQuA-2FE8eOlVivBxRrPWHel4RylInOlIrE26p0Hqcvwx1LbQ4ageIC7ML8EDX8kminngdUZXwTvZU9ee3nD0CJ4RO9XMwi00l-2F0tiqQ7Cio2ynjGBd3kQAQJ3ntx0TBRK6oO-2BbzG5oKIkFRNdujcY7fht4vwitOlwqGJ
2024-10-30 22:12:25 +01:00
Info
Clean
Xming-6-9-0-31-setup.exe
2024-10-30 22:10:17 +01:00
Info
Class
Clean
https://statusentrega.shop/taxa-de-emergencia-excepcional/
2024-10-30 22:09:06 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Python Stealer
AV: 25%
PumpBotPremium.msi
2024-10-30 22:04:09 +01:00
Info
Class
Clean
XmlNotepadSetup.msi
2024-10-30 22:00:10 +01:00
Info
Clean
Healthmark Scope Viewer - Local Mode 05252021 (1).msi
2024-10-30 21:54:48 +01:00
Info
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-30 21:54:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 96%
file.exe
2024-10-30 21:54:08 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-30 21:54:08 +01:00
Info
Class
Clean
http://url2231.premiumid.nl/ls/click?upn=u001.6lm5lIwo2cRdSMMBnA0WfNFxGd9WK9xXN7cHxg-2FZL0Uqq96G10BNxAInXJXoyhC1nyP6942iVHlvk7lJFmLwXVMno49sd8W4EUXsOLrZvj-2BnczNfuAceBF0Lv9HJcMwhN6Sb_lgCmrA1vraV40GdNbRPgZWxHnGIge2sS2dg4uihnnV8keUHxPlFqh4soFj360ICb3F1xhpXMZY36U5e5SIldpLrSZ8PQx0SoFXrt2-2FE-2FWKuylt4TaCsRAKi24JUAj-2BgP163wbHouD-2BU0PHwt8fJom0nmvjqtzNi7ZB8u1V2saM3AB9ivsmdB-2B9a730COwA8QQ0m-2FrL6fgVs8SC4NzU-2FN0Q-3D-3D
2024-10-30 21:45:24 +01:00
Info
Clean
https://theebookguide.com/
2024-10-30 21:44:38 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column