top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Incomplete analysis
AV: None
https://zworker11.me/?endpoint%5C=fwzSM0C0qrg:APA91bGCBDJJ0OADnBPx2u8ynfY9lNxvv_H2Oe9i61i4dGr96_JWv005IvOuzUEpRr1c0gTFlkS9ddNTCILzKq7JV8ThhkEG65NIFzMfIXFaCJnFh5n7Ka9nqCbLJn1qgEg-9P1ZeHED&ver%5C=2
2024-10-25 10:46:52 +02:00
Info
Malicious
AV: 34%
no Icon
la.bot.arm7.elf
2024-10-25 10:42:08 +02:00
Info
Class
Malicious
AV: 39%
no Icon
la.bot.arm5.elf
2024-10-25 10:42:08 +02:00
Info
Class
Malicious
AV: 34%
no Icon
la.bot.arm6.elf
2024-10-25 10:42:08 +02:00
Info
Clean
Payment Advice Note from 23.10.2024.PDF
2024-10-25 10:40:36 +02:00
Info
Clean
http://dyserthwaterfalls.co.uk
2024-10-25 10:37:35 +02:00
No classification & info
no
Graph
Malicious
AV: 24%
no Icon
la.bot.sparc.elf
2024-10-25 10:37:05 +02:00
Info
Clean
http://systemks.pl
2024-10-25 10:34:03 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Suricata
Cobalt Strike
AV: 13%
no Icon
seethebestthingsevermeetwithgreatthingstobegood.hta
2024-10-25 10:32:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Cobalt Strike
AV: 18%
no Icon
greatthingswithgoodnewsgivenbygodthingsgreat.hta
2024-10-25 10:32:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Cobalt Strike
AV: 33%
no Icon
seethebestthingstobegoodwithhislifebestthigns.hta
2024-10-25 10:32:05 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
LummaC
AV: None
file.exe
2024-10-25 10:26:06 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Stealc
AV: None
file.exe
2024-10-25 10:26:06 +02:00
Info
Class
Clean
https://is.gd/EBALCAO5538GERENCIA9475TRIBUT
2024-10-25 10:23:52 +02:00
Info
Clean
test_sample.zip
2024-10-25 10:22:39 +02:00
Info
Malicious
AV: None
https://onedrive.live.com/redir?resid=A2C259BD24DEB977%211517&authkey=%21AMV6sdjMIZf95vs&page=View&wd=target%28Quick%20Notes.one%7C8266a05f-045a-4cc0-bddc-4debc90069bb%2FNotera%20H6TYD9J4rDFDFECZC-HUYW%7Ca949d04d-b4e2-4509-b99f-d04546199b7b%2F%29&wdorigin=NavigationUrl
2024-10-25 10:21:53 +02:00
Info
Clean
https://google.com/amp/s/docs.zoom.us/doc/wa4EksmOSPmA2TZMu5KOEA
2024-10-25 10:19:47 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Suricata
Lokibot
AV: 97%
1729844285df3beefdd998d9488ed81285c601b4206d2d286448af87fbe46e5e262d812b0f698.dat-decoded.exe
2024-10-25 10:19:07 +02:00
Info
Class
Malicious
  • Sigma
AV: None
ES Ny kontraktsrunda.msg
2024-10-25 10:16:53 +02:00
Info
Class
Malicious
AV: None
https://klickskydd.skolverket.org/?url=https%3A%2F%2Fonedrive.live.com%2Fredir%3Fresid%3DA2C259BD24DEB977%25211517%26authkey%3D%2521AMV6sdjMIZf95vs%26page%3DView%26wd%3Dtarget%2528Quick%2520Notes.one%257C8266a05f-045a-4cc0-bddc-4debc90069bb%252FNotera%2520H6TYD9J4rDFDFECZC-HUYW%257Ca949d04d-b4e2-4509-b99f-d04546199b7b%252F%2529%26wdorigin%3DNavigationUrl&id=71de&rcpt=johan.brandt@skolverket.se&tss=1729830791&msgid=2d0ccdeb-928a-11ef-8a2e-0050569b0508&html=1&h=008c08c0
2024-10-25 10:16:53 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column