top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
AV: 18%
jiasuowenjian.msi
2024-12-19 21:50:11 +01:00
Info
Suspicious
Larry’s Lumber.pdf
2024-12-19 21:48:44 +01:00
Info
Clean
no Icon
wrjkngh4.elf
2024-12-19 21:42:11 +01:00
No classification & info
Clean
  • Sigma
B_Wurth_.eml
2024-12-19 21:40:43 +01:00
Info
Malicious
AV: None
https://kubota.highq.com/kubota/externalAccess.action?linkParam=248Md4JKaxiIU4vwlQaNq5FLgPVNq03doY6pcXaLJD4%3D&documentDownload=link
2024-12-19 21:40:43 +01:00
Info
Class
Malicious
AV: None
https://kubota.highq.com/kubota/viewUserProfile.action?metaData.encryptTargetUserID=D1l4_GI3rHw=&metaData.updateUserProfileProcess=true
2024-12-19 21:40:43 +01:00
Info
Class
Malicious
AV: None
https://kubota.highq.com/kubota/sitecontroller.action?metaData.siteID=7&metaData.parentFolderID=74
2024-12-19 21:40:43 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
Meduza Stealer
AV: 31%
billys.exe
2024-12-19 21:34:11 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
CredGrabber, Meduza Stealer
AV: None
ruppert.exe
2024-12-19 21:34:05 +01:00
Info
Class
Suspicious
  • Yara
  • Sigma
Canalyst Modeling Tools Excel Add-in.exe
2024-12-19 21:32:09 +01:00
Info
Class
Suspicious
  • Sigma
de 7SWR1.msg
2024-12-19 21:29:22 +01:00
Info
Malicious
AV: None
https://track.samsupport.jmsend.com/z.z?l=aHR0cHM6Ly9zYW1zdXBwb3J0cy1jb20uam1haWxyb3V0ZS5uZXQveC91P3U9ZWJlNTI4YmMtYTNjMS00NjI0LWFmZjEtYzcwNDJmMjczZWIw&r=14771356625&d=20437066&p=1&t=h&h=40dfe9be3647ce867f619b07dd91c655
2024-12-19 21:29:22 +01:00
Info
Suspicious
https://track.samsupport.jmsend.com/z.z?l=aHR0cHM6Ly9zYW1zdXBwb3J0cy1jb20uam1haWxyb3V0ZS5uZXQveC9kP2M9NDQxMzQ3MzQmbD0zZjVlZjgwMi1mNjE0LTQwNTItYWNiYi02OTI1NGEzODQzMzUmcj1lYmU1MjhiYy1hM2MxLTQ2MjQtYWZmMS1jNzA0MmYyNzNlYjA%3d&r=14771356625&d=20437066&p=1&t=h&h=61366d522f8e8d90d0b0b83afb3eabad
2024-12-19 21:29:22 +01:00
Info
Suspicious
https://track.samsupport.jmsend.com/z.z?l=aHR0cHM6Ly9zYW1zdXBwb3J0cy1jb20uam1haWxyb3V0ZS5uZXQveC9kP2M9NDQxMzQ3MzQmbD01ZWU0M2Q2Mi1mMzY1LTQ3MDktYTRmYS1jMTlmODVhMTYyNzgmcj1lYmU1MjhiYy1hM2MxLTQ2MjQtYWZmMS1jNzA0MmYyNzNlYjA%3d&r=14771356625&d=20437066&p=1&t=h&h=27d104c411b030600c37f4ba42135ec4
2024-12-19 21:29:22 +01:00
Info
Incomplete analysis
AV: None
https://securelogononline.blob.core.windows.net/open/acess.html?44ju8
2024-12-19 21:23:19 +01:00
Info
Malicious
  • Yara
  • Suricata
Xmrig
AV: 44%
no Icon
copy_netaddr.elf
2024-12-19 21:22:05 +01:00
Info
Class
Suspicious
ElbyVCD.dll
2024-12-19 21:19:11 +01:00
Info
Suspicious
https://mandrillapp.com/track/click/31017443/control.coalitioninc.com?p=eyJzIjoibGpQeUdQa1c5cnZMV2piZ3lMLU8wVFdieXBnIiwidiI6MSwicCI6IntcInVcIjozMTAxNzQ0MyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2NvbnRyb2wuY29hbGl0aW9uaW5jLmNvbVxcXC9ub3RpZmljYXRpb25zXFxcLz96ZXJvLWRheS1hbGVydD02Y2RiYmI2MS05NzBhLTRjOWEtOTg0Ni0xZTg1YjVkOTZhMDhcIixcImlkXCI6XCIzYmY2NzEzZjM4MzI0NjVkOTc3YjAwNTNjMDNmOWRjNlwiLFwidXJsX2lkc1wiOltcImY2OGMwZGNhYWU4NzRjNGE1MTk5MzEzZjU3ZDA5ODk0ODAzYzZiMWJcIl19In0
2024-12-19 21:17:58 +01:00
No classification & info
no
Graph
Malicious
AV: 14%
ElbyVCD.dll
2024-12-19 21:17:09 +01:00
Info
Clean
https://www.google.com.hk/url?q=3DKWUZMS42J831JSWOSF4KEIP36T3IE7YuQiApLjODz3yh4nNeW8uuQi&rct=3DXS%25RANDOM4%25wDnNeW8yycT&sa=3Dt&esrc=3DnNeW8F%25RANDOM3%25A0xys8Em2FL&source=3D&cd=3DtS6T8%25RANDOM3%25Tiw9XH=%20&cad=3DXpPkDfJX%25RANDOM4%25VS0Y&ved=3DxjnktlqryYWwZIBRrgvK&uact=3D&url=3Damp%2Fcmn.com.pt/cgrygfrr/77059bd6761a7f03ff928a70787dd5a6/Ym=%20FybXN0cm9uZ0Bjc3NoZWFsdGguY29t
2024-12-19 21:15:30 +01:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column