top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
Amadey
AV: None
2852oQ7OHx.exe
2024-10-30 06:29:13 +01:00
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 61%
Purchase Order PO61000016222.exe
2024-10-30 06:29:05 +01:00
Info
Class
Clean
  • Sigma
TlsPatcher-1.1.1.exe
2024-10-30 06:21:22 +01:00
Info
no
Graph
Clean
  • Sigma
TlsPatcher-1.1.1.exe
2024-10-30 06:16:31 +01:00
Info
no
Graph
Malicious
  • Yara
  • Suricata
LummaC
AV: 23%
file.exe
2024-10-30 06:15:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Stealc, Vidar
AV: 39%
file.exe
2024-10-30 06:15:05 +01:00
Info
Class
Clean
https://konexial.com
2024-10-30 06:04:51 +01:00
Info
Clean
https://tracking.jambarteambuilding.com/f/a/o4wySs4gO6iCrdv3KjQykw~~/AAAHUQA~/RgRpBDEDP4QRAWh0dHBzOi8vYWxhdHVzLmVvbWFpbDQuY29tL3Vuc3Vic2NyaWJlP2VwPTImbD1iZGExMTAzMC1jN2U2LTExZWMtOTI1OC0wMjQxYjk2MTU3NjMmbGM9MWExYTNlMDgtNmJlYy0xMWVmLWE4ZjUtNGQ0NTUwNjA2NGQ1JnA9MDE2ZjUwOGUtOTRmMy0xMWVmLTg0YTYtZjk1MDllMDU1MmM5JnB0PWNhbXBha
2024-10-30 05:52:54 +01:00
Info
Clean
https://email.nationalgeographic.com/T/v600000192d461b369a965aaf4bbe5cfc0/b0a141541c854b2b0000021ef3a0bcf0/b0a14154-1c85-4b2b-a826-24f74eee951f?__dU__=v0G4RBKTXg2GtTHJDsy7ii3waBSrIwMXGZJ7x_OARFKFQAIe3mwx22JG_r9Sy1LWLGyMVrrFIdudbYjwKGAKz6iTAgyV5XAM3SbSN-FzJU9XXpFWtSFRxbGw4nHcgLdnvWYAVcbDlQyQtE1-NmUBscmA==&__F__=v0fUYvj
2024-10-30 05:52:25 +01:00
No classification & info
no
Graph
Malicious
  • Yara
Credential Flusher
AV: 45%
file.exe
2024-10-30 05:49:04 +01:00
Info
Class
Clean
https://login.techsmith.com/u/email-verification?ticket=wCQJfJBD6hefmJawdb8xMgMT8AEKlOww#
2024-10-30 05:34:47 +01:00
Info
Malicious
  • Yara
RMMx8h5mVJ.exe
2024-10-30 05:34:42 +01:00
Class
Clean
http://tracking.jambarteambuilding.com
2024-10-30 05:30:55 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 66%
Statement JULY ~ SEP 2024 USD 19,055.00.exe
2024-10-30 05:28:04 +01:00
Info
Class
Clean
https://info5945780.wixsite.com/so/tr/715d2884-36d5-4b99-8510-9755727565a8/c?w=Dy1tGzq7EOdQY3GZ0CmVOg36KaQT7CrLm7%2F5i60N5Yk.eyJ1IjoiaHR0cHM6Ly93d3cubmV4dHBvaW50dGVubmlzLmNvbS8vZmlsZS1zaGFyZS80NTA5OGUxMS0zM2VkLTQ1M2QtOTUxOC05MTQ4MmRiYjAyN2IiLCJyIjoiM2M3ZTA5ZTctZGE4MC00NGEzLTkzOWItMmZlNDAxOTFhZTdjIiwiYyI6IjI4MDJjYWFjLW
2024-10-30 05:26:13 +01:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
LummaC, Amadey, Credential Flusher, Lumm
AV: 96%
file.exe
2024-10-30 05:23:12 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 43%
file.exe
2024-10-30 05:23:07 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
DCRat, PureLog Stealer, zgRAT
AV: 66%
0JLWNg4Sz1.exe
2024-10-30 05:21:06 +01:00
Info
Class
Malicious
  • Yara
RedLine
AV: 47%
lNf8XY8HLb.exe
2024-10-30 05:18:09 +01:00
Info
Class
Clean
https://mail-link.semrush.com/CL0/https:%2F%2Fwww.semrush.com%2Ftracking%2Flandscape%2F10648294_761375.html/1/01000192d849cc6b-f69a9589-c13f-4bc7-83d4-dfae739d7c07-000000/DD0S2pQhwqk0YAegWDpt9Uk7H5icVZYovn_YlyQ2pAk=376
2024-10-30 05:17:08 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column