top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
https://docs%5B.%5Dgoogle%5B.%5Dcom/forms/d/e/1FAIpQLSeljnRg-qjvYgv0NwpPb7cv5HkDjV-2yI5qhQDfiruDCpJneA/viewform?usp=sf_link
2024-03-28 11:22:47 +01:00
Info
Malicious
  • Sigma
h32trial.exe
2024-03-28 11:21:10 +01:00
Info
no
Graph
Malicious
http://avsvmcloud.com
2024-03-28 11:17:38 +01:00
No classification & info
no
Graph
Malicious
  • Sigma
h32trial.exe
2024-03-28 11:17:23 +01:00
Info
no
Graph
Suspicious
https://de.softonic.com/artikel/sendungsverfolgung-fur-pakete-von-dhl-hermes-und-anderen-paketdiensten?utm_source=sem&utm_medium=paid&utm_campaign=google_de_dsa_cpa&utm_source=bing&utm_medium=paid&utm_campaign=bing_google_de_dsa_cpa&msclkid=9eca42f7fe781815327824f2c51bdb7b
2024-03-28 11:15:52 +01:00
Info
Class
Clean
payment copy1.msg
2024-03-28 11:14:20 +01:00
No classification & info
no
Graph
Malicious
  • Yara
  • Snort
HTMLPhisher
AV: 5%
https://topteamoscarlubricants.online/nba#ZGluYUBqdmRtLmNvLnph
2024-03-28 11:12:55 +01:00
Class
no
Graph
Malicious
  • Yara
  • Snort
HTMLPhisher
AV: 16%
https://cloudflare-ipfs.com/ipfs/bafybeific5oh7p6dvnpe2yvzaxfuvvaf5c6xpacgz774hqgtk4xznu2v5m/#r.cortes@system-asefin.com
2024-03-28 11:02:04 +01:00
Info
Class
Clean
peugeot_update.exe
2024-03-28 11:01:14 +01:00
Info
Malicious
DelTempDM.cmd
2024-03-28 10:52:36 +01:00
Info
Malicious
  • Yara
  • Sigma
GuLoader
AV: 67%
JUSTIFICANTE DE PAGO S.SOCIAL (1)pdf.exe
2024-03-28 10:51:41 +01:00
Info
Class
Malicious
AV: 34%
49758b8.dll
2024-03-28 10:50:05 +01:00
Info
Malicious
  • Yara
  • Sigma
AgentTesla, Neshta, PureLog Stealer
AV: 60%
Order 24007219.exe
2024-03-28 10:48:05 +01:00
Info
Class
Malicious
  • Sigma
XnUEBMnOEd.exe
2024-03-28 10:47:04 +01:00
Info
Class
Malicious
  • Yara
  • Snort
GCleaner
AV: 47%
Wz9s7ibPaf.exe
2024-03-28 10:42:04 +01:00
Info
Class
Suspicious
vlc-3.0.20-win64.exe
2024-03-28 10:36:38 +01:00
Info
Class
Suspicious
https://u43247950.ct.sendgrid.net/ls/click?upn=u001.wDLgoiz2cNZOkou0IpKnk5J-2FKj9b3A7Lp49KK8ofOWwBd9cRCYAGPZlJ68rVxyaks-2BFbek-2BCo4TAuQrZ-2Fwg4Lg-3D-3DscO5_E3jX7UdwUvWW16GmiaKN7LPEtUBKaLsxXZtMVlDNwn7i-2B15T5U91FYQet2mirgfgEPctxhO2enMLbMPJ0ncd08SNWj3rxV7FqidP0Q099S6AeQ5VD6P5yjKzrZKaWEDFHlgzX2pb2dCly4h8O2f-2BRm6t-2B1XRJnQ-2FF-2BFUTSYK-2BVgIFP5Av2BFw3gQD2c6SCyQ9lYvRqacQW-2BcgbPsXbTSVMr4OBNbxJoHf1CBlVp1I-2BY-3D
2024-03-28 10:33:31 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
11111.lnk
2024-03-28 10:32:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
MalLnk
AV: 71%
Document.doc.lnk
2024-03-28 10:32:09 +01:00
Info
Class
Malicious
  • Sigma
  • Snort
f699.js
2024-03-28 10:31:34 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column