top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
http://assistant.crmaiva.ai
2024-03-28 21:12:19 +01:00
Info
Clean
https://www.dropbox.com/scl/fi/xt6vddj807uuijwpyaube/video1062146709.mp4?rlkey=czcszudcwpbvbd0rruijkpt3x&dl=0
2024-03-28 21:12:03 +01:00
Info
Malicious
  • Yara
Bl00dyAdmin, TrojanRansom
AV: None
msmult64.exe
2024-03-28 21:10:24 +01:00
Info
Class
Malicious
HTMLPhisher
AV: None
https://app.frame.io/presentations/e5a98721-636e-41a7-b4b9-23c7d6f1f6c3?component_clicked=digest_call_to_action&email_id=0f3254fb-289d-471c-aa05-4a363e218d3a&email_type=pending-reviewer-invite
2024-03-28 20:59:32 +01:00
Info
Class
Clean
https://clinicalrobotics.com
2024-03-28 20:58:30 +01:00
Info
Malicious
  • Yara
  • Snort
Lokibot
AV: 96%
XZoxEqlRUw.exe
2024-03-28 20:56:05 +01:00
Info
Class
Clean
https://aowxdm.clicks.mlsend.com/tf/cl/eyJ2Ijoie1wiYVwiOjM4OTYzMCxcImxcIjoxMTcwNzc4NjA1MzkxNzIxOTcsXCJyXCI6MTE3MDc3ODYyMjI1MjgyODczfSIsInMiOiJlNGJjZWEyY2QzYzljMDQ0In0
2024-03-28 20:51:14 +01:00
Info
Clean
http://pixel.wp.com
2024-03-28 20:46:38 +01:00
Info
Clean
http://drnavingupta.com
2024-03-28 20:44:19 +01:00
No classification & info
no
Graph
Malicious
  • Yara
  • Snort
Mars Stealer, Stealc, Vidar
AV: 45%
GqMyzGzrFq.exe
2024-03-28 20:41:07 +01:00
Info
Class
Clean
https://www.creditbureaureports.com/iconnect/urlHandler?command=defaultConfig&logid=cnadmtk
2024-03-28 20:36:51 +01:00
Info
Clean
http://pxgcdn.com
2024-03-28 20:35:35 +01:00
Info
Malicious
  • Yara
Vidar
AV: 0%
file.exe
2024-03-28 20:34:05 +01:00
Info
Class
Clean
SecuriteInfo.com.Trojan.Siggen22.10132.16108.21776.exe
2024-03-28 20:33:05 +01:00
Info
Class
Malicious
HTMLPhisher
AV: None
https://pepe-memes.com/d/ax/q?user=mbraedel@hilcorp.com
2024-03-28 20:32:54 +01:00
Info
Class
Clean
Text Sidebar (Annual Report Red and Black design).docx
2024-03-28 20:32:49 +01:00
Info
Malicious
  • Sigma
HtmlDropper, HTMLPhisher
AV: None
Vanderweil Engineers, LLP..pdf
2024-03-28 20:31:44 +01:00
Info
Class
Clean
https://u43352250.ct.sendgrid.net/ls/click?upn=u001.2TkyzlsQCUugGXuDl-2F-2FHUvoM2ETHNpRvqhUsgZ-2FkMBtQax4rppmJj4bCIHTqvH0YHRnRsXf8CGGu4YpLTNZpZ76bC1bPYcH-2Fs7lPN4w9U413Pp7cIHNkwBCX6uL3j2eBHwg-2BebWrg1KUa82t5ZICcmYo0WQM2kZFkD7HpWk75aUnWOlObXQnYMQDVVFJBSIyJTz-2FcgyQYpE1U8MTbTj4og-3D-3DqsOa_iRxCSnIo8RQB7YNudZaC4Ihhi4-2FeFgLLl2lTQIvavZl96L2C56utm-2Bw7ouDj9FEttxzNo52FQOke1iBijoQooSyWq-2FRY6V54aNK82S-2Bkuf-2BN5nHiy67Pr8M73AscSF4EoUq-2BIyu-2B-2F2VMHADSvnRqwUV3Wv5sOhaz4r56562Hs-2F-2FpAGvb5tdJEMLjsqfOaqTe81fKRLd3TCw-2FD9bJpyEXSA-3D-3D
2024-03-28 20:28:53 +01:00
Info
Clean
BFAH EIN.pdf
2024-03-28 20:24:53 +01:00
Info
Clean
https://a.tribalfusion.com/i.match
2024-03-28 20:22:52 +01:00
No classification & info
no
Graph
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column