top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Suspicious
Kristina Lo Capital one #2118.pdf
2024-10-25 22:38:43 +02:00
Info
Clean
https://www.docusign.net/Signing/EmailStart.aspx?a=468f8847-c3e7-4714-847d-595d8340ad46&etti=24&acct=d5bf1001-4e62-4986-9942-0a2accf78f43&er=b62a6350-ed0b-4482-b295-7844ad412faf
2024-10-25 22:37:04 +02:00
Info
Malicious
  • Yara
  • Suricata
AV: 18%
5Z1WFRMTOXRH6X21Z8NU8.exe
2024-10-25 22:36:08 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: 50%
VAIIBIHmtT.exe
2024-10-25 22:36:07 +02:00
Info
Class
Malicious
  • Yara
Mirai
AV: 50%
no Icon
main_mpsl.elf
2024-10-25 22:32:05 +02:00
Info
Class
Clean
https://biruuq.com/f.php?e=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%3D%3D&fp=3f9689c9c10f3e5af454abad6931a2b8
2024-10-25 22:28:38 +02:00
Info
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 34%
v32oH5Xhqw.exe
2024-10-25 22:26:06 +02:00
Info
Class
Clean
https://www.canva.com/link?target=https%3A%2F%2Fxxx.f2e48acf9fceba4c863bc3ac7ba32a0f29b4cb01.site&design=DAGUl-uYzdA&accessRole=viewer&linkSource=document
2024-10-25 22:21:23 +02:00
Info
Malicious
  • Sigma
  • Suricata
HTMLPhisher, Mamba2FA
AV: None
Rob.Kuster@stonhard.com.zip
2024-10-25 22:21:03 +02:00
Info
Class
Clean
http://hosuecallpro.com
2024-10-25 22:17:21 +02:00
Info
Malicious
AV: 26%
file.exe
2024-10-25 22:17:06 +02:00
Info
Class
Suspicious
INSTALL.EXE
2024-10-25 22:12:39 +02:00
Info
Class
Malicious
AV: None
no Icon
Bill Payment__8084746.html
2024-10-25 22:11:39 +02:00
Info
Class
Malicious
  • Sigma
  • Suricata
HTMLPhisher, Mamba2FA
AV: None
zip file.zip
2024-10-25 22:06:47 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
FormBook
AV: 68%
2998MOD PO.exe
2024-10-25 22:02:04 +02:00
Info
Class
Incomplete analysis
AV: None
http://notifications.canadapost-postescanada.ca
2024-10-25 21:57:02 +02:00
Info
Malicious
AV: 21%
no Icon
sshd.elf
2024-10-25 21:52:05 +02:00
Info
Malicious
  • Yara
Mirai
AV: 47%
no Icon
main_arm.elf
2024-10-25 21:52:05 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-25 21:51:07 +02:00
Info
Class
Malicious
  • Yara
Stealc
AV: None
file.exe
2024-10-25 21:51:05 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column