top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
RHADAMANTHYS, XWorm
AV: 3%
file.exe
2024-08-27 18:07:10 +02:00
Info
Class
Malicious
  • Sigma
AV: None
ocedures.msg
2024-08-27 18:06:30 +02:00
Class
no
Graph
Malicious
AV: 13%
file.exe
2024-08-27 18:04:12 +02:00
Info
Class
Clean
https://teluq-my.sharepoint.com/:x:/g/personal/marieke_zavallone_teluq_ca1/EZdyI1xAEL1Ci70C3BzcLaYBtuHkBUTg8lslugx_btEpzw?e=4%3a2LLC34&at=9&xsdata=MDV8MDJ8U2VydmljZXNUSUNAY3NzaGJvLmdvdXYucWMuY2F8YTQ1ODIzYTdkNzlkNDBmYWFkZmMwOGRjYzY4ZjYyYTV8ZDY4Zjk1NTc1ZjRhNDg1MWIwMjY2MWJiZjg0ODI3NDN8MHwwfDYzODYwMzU2NjMyOTYyNjM5OXxVbmtub3dufFRXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENKUUlqb2lWMmx1TXpJaUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMD18MHx8fA%3d%3d&sdata=ODVoRWMyemdzeHN6S05ER000VzkxditTdkpPYlZoVkRzOTF6dFdybzNwTT0%3d
2024-08-27 18:03:22 +02:00
Info
Clean
https://files.fm/u/vtrxvgdh6w
2024-08-27 18:03:17 +02:00
No classification & info
no
Graph
Malicious
  • Yara
AV: 11%
file.exe
2024-08-27 17:57:09 +02:00
Info
Class
Malicious
  • Yara
HTMLPhisher
AV: None
Smeg SignRequest.pdf
2024-08-27 17:56:38 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
Amadey
AV: 61%
I7GcHDtUIF.exe
2024-08-27 17:56:13 +02:00
Info
Class
Clean
https://drop.dor.state.ma.us/human.aspx?OrgID=2763&Arg12=message&Arg06=180947434&Arg08=6a6gy6fi61caub09
2024-08-27 17:55:38 +02:00
Info
Malicious
  • Sigma
HTMLPhisher
AV: None
Murexltd Mail Security Update Required For gjohnson@murexltd.com.msg
2024-08-27 17:54:23 +02:00
Class
no
Graph
Incomplete analysis
AV: None
Lsawrenko Approved-Review-PYMTADV Cnv.docx
2024-08-27 17:46:54 +02:00
Info
Clean
https://d3k0gij77b1jti.cloudfront.net
2024-08-27 17:46:51 +02:00
Info
Malicious
AV: None
https://employment-hr.com/66ccd2230405d/5b8cbe0b82e29621df5c72296fc0599da0566b48/
2024-08-27 17:46:34 +02:00
Info
Malicious
  • Yara
Mirai, Okiru
AV: 66%
no Icon
bot.arm6.elf
2024-08-27 17:46:19 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai, Okiru
AV: 58%
no Icon
bot.arm7.elf
2024-08-27 17:46:19 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai, Gafgyt, Okiru
AV: 58%
no Icon
bot.m68k.elf
2024-08-27 17:46:15 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai, Gafgyt, Okiru
AV: 37%
no Icon
bot.mips.elf
2024-08-27 17:46:14 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai, Gafgyt, Okiru
AV: 53%
no Icon
bot.mpsl.elf
2024-08-27 17:46:14 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai, Gafgyt, Okiru
AV: 50%
no Icon
bot.ppc.elf
2024-08-27 17:46:14 +02:00
Info
Class
Malicious
  • Yara
  • Suricata
Mirai, Gafgyt, Okiru
AV: 55%
no Icon
bot.sh4.elf
2024-08-27 17:46:10 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column