top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Suspicious
https://www.nesting-software.com/downloads/
2024-10-29 20:10:34 +01:00
Info
no
Graph
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer
AV: 55%
MV. NORDRHONE VSL's PARTICULARS.xlsx.exe
2024-10-29 20:10:14 +01:00
Info
Class
Clean
https://allieduniversalsecurity.my.salesforce.com/servlet/servlet.ImageServer?oid=00D20000000BeEh&esid=018Tc00000AmX38&from=ext
2024-10-29 20:09:14 +01:00
Info
Malicious
  • Yara
HTMLPhisher
AV: None
https://dartergary.wordpress.com/
2024-10-29 20:09:09 +01:00
Info
Class
Malicious
AV: None
https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFmiRUl-2BtxcZ73D3PC6s7dEdSEpNEVf7BmEr33HzpWyzDy2Qc_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZML5SAWON4OCquRGeOrZOG6X7bKIH2ouDi7O5ssZhkwdV9j8BuAetGO74HzivTb4yjw5AGX5ZMnsGYBS3vBuNNgFYRVSYVxc5dN7eCLDUr43XjgYUZE2GmJzXmN-2BelIHWKsvaOOIeqiW6cnMf2CI6MeEhodwtV2LpZJtWZhkGi5I2rlc08PnxbPlMsOj2Cr9oC-2BCWb9WuPqmZU8rqYD8CNL-2BgY3UElGOq-2BfG3NfYFdrc0Rb11eU0t5G2ihyqzzZVfI-3D#cHNjaG1pdHRAZ3Jpc3Qub3Jn
2024-10-29 20:07:52 +01:00
Info
Clean
no Icon
Screenshot_20241029_133056_Chrome.jpg
2024-10-29 20:07:22 +01:00
No classification & info
Clean
no Icon
tftp.elf
2024-10-29 20:07:12 +01:00
Info
Malicious
  • Yara
  • Suricata
Mirai
AV: 68%
no Icon
belks.arm.elf
2024-10-29 20:06:27 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 68%
no Icon
belks.arm6.elf
2024-10-29 20:06:22 +01:00
Info
Class
Malicious
  • Yara
AV: 68%
no Icon
belks.arm5.elf
2024-10-29 20:06:22 +01:00
Info
Malicious
  • Yara
  • Suricata
Mirai
AV: 68%
no Icon
belks.arm7.elf
2024-10-29 20:06:22 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai
AV: 66%
no Icon
belks.mips.elf
2024-10-29 20:06:22 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai
AV: 66%
no Icon
belks.mpsl.elf
2024-10-29 20:06:17 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai
AV: 66%
no Icon
belks.sh4.elf
2024-10-29 20:06:17 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai
AV: 66%
no Icon
belks.ppc.elf
2024-10-29 20:06:17 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai
AV: 66%
no Icon
belks.spc.elf
2024-10-29 20:06:12 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai
AV: 71%
no Icon
belks.x86.elf
2024-10-29 20:06:12 +01:00
Info
Class
Clean
https://chat.zipzip.ai/
2024-10-29 20:05:42 +01:00
Info
Malicious
  • Yara
  • Suricata
LummaC, Amadey, LummaC Stealer
AV: 34%
file.exe
2024-10-29 20:05:12 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 39%
file.exe
2024-10-29 20:05:11 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column