top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
AV: 24%
3dя.lnk
2024-04-18 22:48:05 +02:00
Info
Class
Incomplete analysis
AV: None
http://cnbck.playbattlegrounds.com
2024-04-18 22:47:33 +02:00
Info
Malicious
  • Sigma
AV: None
http://apps.identrust.com/roots/dstrootcax3.p7c
2024-04-18 22:47:24 +02:00
Info
Malicious
HTMLPhisher
AV: None
http://wzxqi.theknittingdoula.com/ghoopuh/lopwiuiye
2024-04-18 22:47:23 +02:00
Info
Class
Malicious
  • Sigma
AV: 3%
derp.bin.dll
2024-04-18 22:43:11 +02:00
Info
Class
Clean
https://drive.filen.io/d/86d87964-c23f-4257-ab67-1d3a6a53307f#p6azJi5gS13nDkjcLoSnKfqLeQFJ51Va
2024-04-18 22:42:21 +02:00
Info
Clean
https://usps.pst-zxl.top
2024-04-18 22:38:10 +02:00
Info
Clean
http://apps.identrust.com/roots/dstrootcax3.p7c
2024-04-18 22:36:33 +02:00
Info
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 66%
Gcerti Quote.exe
2024-04-18 22:35:09 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 50%
KZWCMNWmmqi9lvI.exe
2024-04-18 22:35:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer, RedLine
AV: 39%
Payment.exe
2024-04-18 22:35:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer, RedLine
AV: 47%
Arba Outstanding Statement.exe
2024-04-18 22:34:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 61%
4v7myD9mN2OaWZp.exe
2024-04-18 22:34:12 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla, DarkTortilla
AV: 63%
DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exe
2024-04-18 22:34:07 +02:00
Info
Class
Clean
https://code-3s3r10.youramys.com/MyoilQ?rgN39
2024-04-18 22:19:44 +02:00
Info
Clean
JBSA NAF LAK-21.pdf
2024-04-18 22:13:34 +02:00
Info
Clean
https://tnxqbx.vaptt.log.br/YKxqkU/Z6r9cspDYwjh8rmYfU5ZUW45NR9FaUMI3KqYrKGsvTm00mZfTR3XkxdbGMtUAB1yV7VIRYEp6Arrp1yCchwtKujAwotGkUugKqlpXESUk8v27mvDsDgYph6EBriOABKZtgV91bKGrlxiO2t1YIHDIiXKnLS20ssJxQTrJ8tmrPTI7D4ijiuDjOAYB1e1F9xqneiKl0lZHkvTvgg21gDgj3sNLVctWnEuGj8SEska4CKBcUHcbii3oE2RiqozlMyWFIpqfPD5U3oZVGZoYLn6I8dbRZR6OpiOBjAZ6r9cs-amVhbmV0dGUuZ2lsbW9yZS1oZWJlcnRAamVmZnBhcmlzaC5uZXQ=
2024-04-18 22:11:41 +02:00
Info
Malicious
  • Yara
  • Snort
Mirai
AV: 42%
no Icon
9IseFevRH6.elf
2024-04-18 22:11:11 +02:00
Info
Class
Clean
http://tr.teams.microsoft.com
2024-04-18 22:11:11 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Snort
Mirai
AV: 37%
no Icon
czEunnbk7b.elf
2024-04-18 22:11:10 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column