top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
https://ecards.heart.org/student/eCards?type=1&cid=D873BFFB-282E-4CFE-B748-FCF7ABBEAA35
2024-10-25 13:56:39 +02:00
No classification & info
no
Graph
Malicious
AV: None
https://u47839971.ct.sendgrid.net/ls/click?upn=u001.SS8YqfWjf1b3UNFf2g8-2BbyepSJ9NnVqTjg5p4PlqyZLDG-2F-2FRHUWKB7tpHO-2BD9IAzfDK69NBor6n5GDDWuKOaXjILtpHrb-2FuqosweWIwJauCFjFOIVaIDje-2BTbWeqpid-2Fe0IpJIrTIznxRC8RuWTXkcZZXZKUxIgeeMWOFH96Tjh3a3uDeIXRyoiB6ZRGKZhHD63OuPdyktyTbMDbA-2FurGQ-3D-3DGlRK_1fgoI9z-2BmeHj6kFR5jmXJyN8Vyo9ja5rNrkl1rR8UXAlmAe6PSc2-2FD85CLOIF98tpCjfsSquWpaRYnYzjD-2B-2FDF-2F8BwiwRSEwmTXwwlDUaQI3bDBZTUv-2Ffbse4A61ed6hVc-2BhhTqdpCqzpir5GY49O-2BVdqG9mHEhTR8OvRsDhxES9QAdY7ZiH-2BurXMNUWGL6VuIIVYma05ZXZK6zhQMDhjNBnJShmRWPp7Ow2IJgH96F8uRyUdyMUZ9au5PfRhmvWMnTj3B1KVxYBpNo7XRlBSlYjK74Z4HptPWz0XAvVILLp4Z5Qq7I-2BYF76YXE5ZsE-2F9hOEdmxnqZwZIEaC1BNDg2XB-2BluEEvEXRuR9ohEPc6VObquUxTQmba8bObSY0wG3oOeb2xD8hV6IKwMnr9d-2B5HbQscEqkWH5k7qnk6bAGBIHHNt95VH4uagG-2Bh74PJCdwHqpitEnC4IeAHXNdNtMkKw34-2BF8TeV7q4SmkRwe9osbefOHPWGyls7sZdEjodVX7wlBDRV2BLQlTlDkK-2FzuZ2EsHCtWTv7yrVJT-2B6p3fl4O5qZGyWAuATjn7386SmbgYFZYAIaRjabXb6J3Z9IYhB-2BBiP3zxZSMd-2BGGNtSLCQw7FqwKOUhYoEZSgG-2FLraJhb7xOSF-2FZGKBw-2FWGPQ5W16K6ZnP31akPWN-2FRy3A1tFL9-2FQXaviWuNn8VOeqLfBR9isxQ-2BqB-2Fm-2BPFRMhM4zyM42FPD-2FRIJxCXHHfAnucSqTKeA1iykI89pw6joYB-2B9v-2FXzQpkgszpTxbxZcZ7mH0xUY6S3QZDaIWpt-2F-2B0FpvTn8cArsTTKjQo1QO476bdWvqqoz32vBNn214xuFkN0blGHeazkhMWwmEzZM6r-2BTFrW2-2Fha62dTAc7eNUguY6HOm3gtrj2-2FYlAidnBTp5Y8fj3jmA-3D-3D
2024-10-25 13:55:13 +02:00
Class
no
Graph
Malicious
  • Yara
  • Suricata
Stealc, Vidar
AV: 47%
file.exe
2024-10-25 13:49:07 +02:00
Info
Class
Malicious
  • Yara
Credential Flusher
AV: 47%
file.exe
2024-10-25 13:49:05 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-25 13:48:06 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
HTMLPhisher
AV: None
Quarantined Messages (1).zip
2024-10-25 13:40:56 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Socks5Systemz
AV: 13%
gi5qOqqypd.exe
2024-10-25 13:40:05 +02:00
Info
Class
Clean
no Icon
Document.html
2024-10-25 13:28:37 +02:00
Info
Suspicious
http://www.baidu.com
2024-10-25 13:26:20 +02:00
Info
Class
Suspicious
czcansrv.exe
2024-10-25 13:16:04 +02:00
Info
Malicious
AV: None
Play____Now_AUD__Neil.novembre.htm
2024-10-25 13:14:31 +02:00
Class
no
Graph
Clean
  • Sigma
GJIBADMGILGDJABOCKFMGEBJIAPFPIFP_3_86_0_0.crx
2024-10-25 13:11:37 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Stealc, Vidar
AV: 54%
3WffcqLN3q.exe
2024-10-25 13:11:05 +02:00
Info
Class
Suspicious
https://teams.microsoft.com/l/team/19%3aww5JFtClIKupjpkV38TgJ0YzQ49k447hu7wnrlcPO0Y1%40thread.tacv2/conversations?tenantId=9b461ef0-8855-43db-9f77-77732f0bbc18
2024-10-25 13:09:21 +02:00
Info
Malicious
AV: 32%
no Icon
la.bot.mipsel.elf
2024-10-25 13:07:05 +02:00
Info
Class
Clean
node-v14.20.0-x64.msi
2024-10-25 13:02:25 +02:00
Info
Malicious
  • Yara
HTMLPhisher
AV: None
no Icon
Fax_Message_04 September, 202411_21_58 AM_564308269612697.htm
2024-10-25 13:02:21 +02:00
Info
Class
Clean
http://http:/linksg.ekincare.com
2024-10-25 13:02:13 +02:00
Info
Malicious
AV: 29%
no Icon
la.bot.m68k.elf
2024-10-25 13:02:06 +02:00
Info
Class
Malicious
Captcha Phish
AV: None
https://developmentltd.online/
2024-10-25 12:59:25 +02:00
Class
no
Graph
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column