top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
TechSupportScam
AV: None
https://xxxjns2qi.z13.web.core.windows.net/
2024-04-26 20:27:46 +02:00
Info
Class
Malicious
AV: None
https://mss.ehs2.com/?dilywvqc
2024-04-26 20:26:59 +02:00
Info
Suspicious
https://t.co/brcRVcgku9
2024-04-26 20:26:01 +02:00
Info
Class
Malicious
AV: None
https://www.clktoro.com/feed/click/?t1=128&tid=859&uid=26&subid=remotescripps.org&id=62b00eca6d15ba41d06e054ec8234620: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
2024-04-26 20:23:28 +02:00
Info
Clean
EPOXY PRIMER.eml
2024-04-26 20:22:35 +02:00
Info
Clean
https://globalgrimmer.com/xxxj
2024-04-26 20:21:04 +02:00
Info
Clean
https://remotescripps.org/?ch=1&js=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJKb2tlbiIsImV4cCI6MTcxNDE1Mzc1OSwiaWF0IjoxNzE0MTQ2NTU5LCJpc3MiOiJKb2tlbiIsImpzIjoxLCJqdGkiOiIydjR0dWRtOGRsODdyZnRzMjAwaGg0czciLCJuYmYiOjE3MTQxNDY1NTksInRzIjoxNzE0MTQ2NTU5NTc0OTUxfQ.4QAtENw-EyGdzGdXpnWXNKSArwdeAYageduFzSwX3pI&sid=8b44beca-03e4-11ef-af17-3cc94e56dea0
2024-04-26 20:14:37 +02:00
Info
Suspicious
http://amazontales.xyz
2024-04-26 20:11:51 +02:00
Class
no
Graph
Malicious
HtmlDropper, HTMLPhisher
AV: 1%
https://control.mailblaze.com/index.php/survey/wq790f4mf09e0
2024-04-26 20:11:26 +02:00
Info
Class
Clean
https://app.esign.docusign.com/e/er?utm_campaign=GBL_XX_DBU_CRN_2211_AccountSuspensionNurture_Email3&utm_medium=email&utm_source=Eloqua&elqCampaignId=21472&s=566810826&lid=11515&elqTrackId=99cdab533df647e8a9a6beec23086536&elq=0e61751db5cb4a92b17a546a39f6da95&elqaid=63010&elqat=1
2024-04-26 20:07:32 +02:00
Info
Malicious
https://www.flowcode.com/page/theferrucciolawfirm
2024-04-26 19:42:37 +02:00
Info
Class
Clean
http://healthandmedicinelawfirm.com
2024-04-26 19:42:01 +02:00
Info
Clean
PS-CollectionTool.exe
2024-04-26 19:41:47 +02:00
Info
Malicious
  • Sigma
AV: 0%
HABICO116N_2024-04-26_16_58_38.139.zip
2024-04-26 19:34:04 +02:00
Info
Class
no
Graph
Suspicious
OnLine_Install_Dialog_UI_SSL.exe
2024-04-26 19:31:03 +02:00
Info
Class
Malicious
  • Sigma
AV: 100%
system.exe
2024-04-26 19:29:01 +02:00
Info
Class
Clean
http://go.microsoft.com/fwlink/?LinkId=787651.
2024-04-26 19:26:25 +02:00
Info
Suspicious
File-11F_385347.exe
2024-04-26 19:26:10 +02:00
Info
Malicious
  • Yara
  • Sigma
Latrodectus
AV: 10%
neo.msi
2024-04-26 19:24:03 +02:00
Info
Class
Clean
https://outlook.office365.com/Encryption/retrieve.ashx?recipientemailaddress=wkoford%40flcu.org&senderemailaddress=vbabilon%40topcu.org&senderorganization=AwF8AAAAAngAAAADAQAAAFLiNAy%2bMHBMrgNoa1JLv8RPVT1UT1BDVS5vbm1pY3Jvc29mdC5jb20sT1U9TWljcm9zb2Z0IEV4Y2hhbmdlIEhvc3RlZCBPcmdhbml6YXRpb25zLERDPU5BTVBSMThBMDAyLERDPVBST0QsREM9T1VUTE9PSyxEQz1DT01sjiYyYH6GR6%2fdBA%2boFpViQ049Q29uZmlndXJhdGlvbixDTj1UT1BDVS5vbm1pY3Jvc29mdC5jb20sQ049Q29uZmlndXJhdGlvblVuaXRzLERDPU5BTVBSMThBMDAyLERDPVBST0QsREM9T1VUTE9PSyxEQz1DT00B&messageid=%3cMW4PR14MB4620C13FE273646CED49EBC8D4162%40MW4PR14MB4620.namprd14.prod.outlook.com%3e&cfmRecipient=SystemMailbox%7b0AF09B7F-434F-4B2F-9CBC-57639EDCFD9C%7d%40TOPCU.onmicrosoft.com&consumerEncryption=false&senderorgid=87e347d3-c643-4789-ba6c-8496a3e9464a&urldecoded=1&e4e_sdata=UH6JXHxXjFqJr5ORbGi72iSocwvY3FBjFZqp%2bQDyMTjkxp3YIoFlz3uiyzRfZo%2fxNm0e2ZVghWANURzMCv4Up2GEkpWJ2X4V8vS3l0DLsTmNDP5%2fc31Mi4HBt23CV8U1KFqt8HzeT3P9SXWGVndRL%2ffYLSvlQ9NIUVoO9Cw%2bWMN71nPxHKF01itEy7MDRN7cmuPlUvyMl6O3WmcG1Tr%2bkAyrywDYm73p2NSXUx%2f3TZmh%2fu4xb3kCzn%2bwnvhuwS8mITrZqbABMKmBBdbIUyFTOhhhrtqwtoAX3qqTyKoiy0n6wpeyH8jbxYuR%2f70SwXPiBTxQTAuZ8gMIJBCHcrH2fQ%3d%3d
2024-04-26 19:20:42 +02:00
No classification & info
no
Graph
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column