top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
AV: 45%
no Icon
insetto-x86.elf
2024-04-19 18:51:04 +02:00
Info
Class
Incomplete analysis
AV: None
http://6743431bef3d4ab5dccbaa0f238647ee109ddfe4167e3f1e737ca36138a54d7f
2024-04-19 18:49:12 +02:00
Info
Suspicious
OpenWebStart_windows-x64_1_9_1.exe
2024-04-19 18:46:42 +02:00
Info
Class
Clean
https://link.pdffiller.com/r?u=15720095&m=3435477410&t=32129&o=5__5236j4GL6O9j0iItXylRxbrYNdUmdde1vs0MZLRs-c8EVMwxI5RUgkMcphZaWNqe7fjiwiPIgRTf0EtU2MeAFE8bXE25EI9e4-AML4IYG_N8oEeQs2x5B6C3xOB1AYZsH8I7Se74bmasvp6cp6VyuQNLKOxxezUUjOEAX-hmBaVfkzgXk8oEvcB4m25RrL-rVjg%3D%3D&s=direct_push
2024-04-19 18:46:20 +02:00
No classification & info
no
Graph
Clean
https://cetworldseries.com
2024-04-19 18:43:04 +02:00
Info
Clean
Request For Quotation (RFQ)_ RFQ2400598.eml
2024-04-19 18:42:39 +02:00
Info
Clean
http://sixmanteams.com
2024-04-19 18:41:59 +02:00
Info
Malicious
AV: 25%
125.exe
2024-04-19 18:40:09 +02:00
Info
Malicious
  • Yara
Mirai
AV: 45%
no Icon
TKon2e9Awc.elf
2024-04-19 18:39:06 +02:00
Info
Class
Malicious
AV: 66%
no Icon
1lkozpLZNX.elf
2024-04-19 18:39:06 +02:00
Info
Class
Malicious
  • Sigma
AV: None
Chapter 4 Test 4A--2013-2014.doc
2024-04-19 18:37:36 +02:00
Info
Malicious
AV: 88%
wr.exe
2024-04-19 18:35:15 +02:00
Info
Class
Clean
https://player.tavoos.net
2024-04-19 18:33:29 +02:00
Info
Malicious
HTMLPhisher
AV: None
https://wetransfer.com/downloads/63408c72b6333965afb0118ce81f53d220240419112437/2452e85458854b24e1ec42e87285f82420240419112457/7d30d1?trk=TRN_TDL_01&utm_campaign=TRN_TDL_01&utm_medium=email&utm_source=sendgrid
2024-04-19 18:32:08 +02:00
Info
Class
Clean
https://shorturl.at/gyQV0
2024-04-19 18:26:57 +02:00
Info
Clean
Q7Ct3eA5NE.exe
2024-04-19 18:18:42 +02:00
Info
Malicious
  • Yara
  • Sigma
GuLoader
AV: 16%
INVOICE pdf.wsf
2024-04-19 18:15:06 +02:00
Info
Class
Malicious
  • Yara
PureLog Stealer
AV: 58%
PROFOMA INVOICE-2024-0419 .exe
2024-04-19 18:13:05 +02:00
Info
Class
Clean
https://www.olocheckout.com/checkout?brandaccessid=_5-oyxhachgzbaleemezfwqed79pp64e&fieldtype=cardnumber&frameid=57xrvcm69qd&version=2.4.0&basketguid=9c85ab6e-3b5f-491c-bb69-0e9d94a3e989
2024-04-19 18:11:49 +02:00
Info
Clean
https://u43944338.ct.sendgrid.net/wf/open?upn=u001.uGit3LLDnkBni-2BP2GH-2BECq-2B3XEFai1gZfAqIUMBfWthopnnKKtQfDmyw-2BIIjj0Pt79IGGDk7e4-2BedU8Ww55KoKWofBxax4AbFyyURLS7DQWRrGnd-2Bo1Snp8G9FtiIH9K7lv-2BKLHWDsHpqGmni2eqKqduMkMsfg8o1oveldTdnSkjlc14phe6zNTs1zx79RPf-2FqT0LfT7fHJPYnHRofFriOZpNXCh8gDAWeueRKMj0HGQ9AQHe1o7djG-2BrqZnoTnY
2024-04-19 18:04:55 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column