top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
SecuriteInfo.com.W32.PossibleThreat.22253.14837.exe
2024-04-23 10:30:10 +02:00
Info
Malicious
no Icon
quv5jvj4v0.elf
2024-04-23 10:25:08 +02:00
Info
Malicious
HtmlDropper, HTMLPhisher
AV: 0%
https://cividalepaolo.com/
2024-04-23 10:24:58 +02:00
Class
no
Graph
Malicious
  • Yara
Gafgyt, Mirai
AV: 39%
no Icon
8nVNg2KqxW.elf
2024-04-23 10:24:17 +02:00
Info
Class
Malicious
  • Yara
Gafgyt, Mirai
AV: 56%
no Icon
Q3nsFVfbem.elf
2024-04-23 10:24:17 +02:00
Info
Class
Malicious
  • Yara
Gafgyt, Mirai
AV: 41%
no Icon
CITauQKjMd.elf
2024-04-23 10:24:17 +02:00
Info
Class
Malicious
no Icon
2s4fTHXEwm.elf
2024-04-23 10:24:17 +02:00
Info
Malicious
  • Yara
Gafgyt, Mirai
AV: 22%
no Icon
PoJxsiOLh2.elf
2024-04-23 10:24:11 +02:00
Info
Class
Malicious
AV: 37%
no Icon
gwX4DFn6ue.elf
2024-04-23 10:24:11 +02:00
Info
Malicious
  • Yara
Gafgyt, Mirai
AV: 40%
no Icon
3UPhJmQfMS.elf
2024-04-23 10:24:11 +02:00
Info
Class
Malicious
no Icon
cqy0lIeLds.elf
2024-04-23 10:24:11 +02:00
Info
Malicious
AV: None
https://tinyurl.com/5n6fprxt
2024-04-23 10:23:21 +02:00
Info
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 71%
Swift_Copy.scr
2024-04-23 10:18:50 +02:00
Info
Class
Clean
http://www.yester-photo.com
2024-04-23 10:16:07 +02:00
Info
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 21%
Ship Docs_ CI_BL_HBL_.exe
2024-04-23 10:14:05 +02:00
Info
Class
Suspicious
$DS_122189.pdf
2024-04-23 10:12:40 +02:00
No classification & info
no
Graph
Clean
https://lx-pluto-mail.qiye.163.com/unsubscribe_en.html?host=lx-pluto-mail.qiye.163.com&sign=tYjJWFMjS3nn3YqvszWFhdv6S7f427CtlG6Qc97yX%2BvgJErYHlag8awX2vfVi%2B12IzWnpp72Z4Ca%0AxsG5%2Bb9mDQ30Lmqfrm9BtpqSiq7XoI%2BjidChX5ytHSJuo9hhv57eCMVHyi2xsxwIEr5x9dnZ3p3o%0ApGb7ImP4SgjKiKpbhL%2F7d1aI4fC5%2Fbj4bOQCi6jm&from=sales1@aaazxy.com
2024-04-23 10:10:54 +02:00
Info
Suspicious
$DS_122189.pdf
2024-04-23 10:06:17 +02:00
No classification & info
no
Graph
Malicious
https://docs.google.com/presentation/d/e/2PACX-1vTSXaY7ubI0TsmtDZGhnfi1zhnSxguMyu2LhG-ysNsdY7OPzg5AMGaTqcxwu9_JVEAMwiEcyOI9wHoz/pub?start=false&loop=false&delayms=3000&slide=id.p
2024-04-23 10:02:30 +02:00
Info
Malicious
  • Yara
  • Snort
RedLine
AV: 68%
pdhmXuEYmc.exe
2024-04-23 09:57:08 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column