top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
StormKitty
AV: 56%
HTZ4az17lj.exe
2024-04-16 14:26:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 37%
April 2024 order Pdf.exe
2024-04-16 14:25:07 +02:00
Info
Class
Clean
https://sunshivproperties.com/views/partials/header.html?white=bWFya2V0aW5nQGJ5cmFtaGVhbHRoY2FyZS5jb20=
2024-04-16 14:20:20 +02:00
Info
Clean
http://links.news.privateinternetaccess.com
2024-04-16 14:16:44 +02:00
Info
Malicious
  • Yara
  • Snort
AgentTesla
AV: 40%
NEW QUOTATION.exe
2024-04-16 14:15:09 +02:00
Info
Class
Clean
https://form.jotform.com/222924400154042
2024-04-16 14:13:43 +02:00
Info
Clean
https://mb.relation-client-digitale.fr/t.htm?u=/e/3/40610/11571/592765/r16pjaafsbhppbgmpamfvgfpsifusspivzg/r.aspx
2024-04-16 14:12:02 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer
AV: 51%
TT Invoice copy.exe
2024-04-16 14:10:07 +02:00
Info
Class
Clean
http://boarshead.ccumwv.org
2024-04-16 14:05:41 +02:00
Info
Malicious
  • Yara
MicroClip
AV: 3%
z69ClienteNFe-Faturada-15042024.msi
2024-04-16 14:05:11 +02:00
Info
Class
Clean
http://reallyfreegeoip.org
2024-04-16 13:58:33 +02:00
Info
Malicious
  • Yara
HTMLPhisher
AV: 0%
no Icon
mal attachment.html
2024-04-16 13:57:33 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Mirai
AV: 67%
no Icon
E0sl4ONdra.elf
2024-04-16 13:57:08 +02:00
Info
Class
Clean
http://click.mail.virtualtrainings.co/?qs=a34a2802da5b987c99d77a91eed125396201717cd0f438a37385f1fc09098d865bd08e754a10ba4cb3e6cf96b351a18785c7d54a48824461a3034c0088963a71
2024-04-16 13:55:57 +02:00
Info
Clean
https://url12.mailanyone.net/scanner?m=1rwgZC-0009V6-3X&d=4%7Cmail%2F90%2F1713265200%2F1rwgZC-0009V6-3X%7Cin12l%7C57e1b682%7C21208867%7C12850088%7C661E5A8ED59803CAA7619FC08E6CF6B8&o=%2Fphto%3A%2Fgtsidtotlot.ecoe.4%2Fd%2FcmfL7MZGhrYJzYbfMsfBFCcIdXTF6Dcd3mIF5IUXJTGao3TBvUJUXeWPEzqbqgzVPbPm9QGScCPojxbRbpPu9XAk8xPTF5C_Va2DfSTRFdH0xSVpS7fQsClkkrj_R_bx6eCs7NYNF8bKB7nWXuQ23KU-Q5IeVaXvfcJdwWFWU7-Qwz8EPdRcAdhttdxQAoG4UzC%2FOyLNNEAzRiAjYA0MXYGS1PjIhpyl85VISGjmxppF71wp3J2vi81cyW1Ju_eXXwe_CslIMZPI5sycsTxltEhPJk%3D8cL&s=PG_E4X5qk5ALFKH9rKcoJXICcW8
2024-04-16 13:55:22 +02:00
Info
Malicious
http://cubes.concordia.ca/track?type=click&enid=bWFpbGluZ2lkPTM2MjMmbWVzc2FnZWlkPTQxMjEmZGF0YWJhc2VpZD05MDEmc2VyaWFsPTEyNzU1MDM1NzUmZW1haWxpZD13YXJpZXN0NTkzMzgud2Vla2x5bWFpbEBibG9nZ2VyLmNvbSZ1c2VyaWQ9NDcxJmZsPSZleHRyYT1NdWx0aXZhcmlhdGVJZD0mJiY=&&&2028&&&http://gbmaucstans.com/?ddg5B=ZnJhbmNvaXMuYm91bGFuZ2VyQGNnaS5jb20=
2024-04-16 13:55:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AgentTesla, PureLog Stealer
AV: 61%
MT103.exe
2024-04-16 13:54:12 +02:00
Info
Class
Malicious
  • Yara
Mirai
AV: 63%
no Icon
c2c5UPqmCv.elf
2024-04-16 13:51:16 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Mirai
AV: 61%
no Icon
zfehGxWbb4.elf
2024-04-16 13:51:16 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Mirai
AV: 57%
no Icon
tL98mBWW8p.elf
2024-04-16 13:51:16 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column