top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Snort
Mirai
AV: 59%
no Icon
cvdLNZXNPZ.elf
2024-03-28 14:47:08 +01:00
Info
Class
Malicious
  • Yara
Mirai
AV: 58%
no Icon
jcTITjYCy0.elf
2024-03-28 14:47:05 +01:00
Info
Class
Malicious
https://americaniv.com/Gfakeperson%40suckithacker.com
2024-03-28 14:46:18 +01:00
Info
Malicious
  • Yara
Mirai
AV: 58%
no Icon
7cengGp7fU.elf
2024-03-28 14:46:05 +01:00
Info
Class
Clean
http://coop60th-sosenkyo.com
2024-03-28 14:45:43 +01:00
Info
Malicious
  • Yara
Mirai
AV: 66%
no Icon
Q9Jn6b7bIj.elf
2024-03-28 14:41:04 +01:00
Info
Class
Clean
http://click.activealliancee.com/?qs=face599d18407c385adfbe8a59c43c35d2880f0327397c7dac107b7f163aabfebad26c872cc5b25b5fe28ebd40afd0da126e707af0562e58
2024-03-28 14:40:52 +01:00
Info
Malicious
https://mmsinconline-my.sharepoint.com/:b:/p/mamundson/EZ0kVsuFb_RJlwEzXHeEJ1gBaR0hj3PwWMy3ECS1r80Lcg?e=96yHrO
2024-03-28 14:36:07 +01:00
Class
no
Graph
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 25%
RFQ.doc
2024-03-28 14:33:36 +01:00
Info
Class
Clean
https://hillsclerk.securityeducation.com/
2024-03-28 14:32:40 +01:00
Info
Incomplete analysis
https://am.freshrelevance.com
2024-03-28 14:29:59 +01:00
Info
Malicious
  • Snort
https://drpetre.com/
2024-03-28 14:29:54 +01:00
Info
Malicious
  • Yara
  • Sigma
Njrat
AV: 82%
SecuriteInfo.com.Trojan.Siggen10.9096.15276.30319.exe
2024-03-28 14:29:10 +01:00
Info
Class
Suspicious
SecuriteInfo.com.Trojan.PWS.Steam.36457.26808.16558.exe
2024-03-28 14:29:10 +01:00
Info
Class
Clean
Unit 10 - Lesson 3 - June 15th.pdf
2024-03-28 14:22:07 +01:00
Info
Malicious
  • Sigma
AV: None
https://www.attemplate.com/gcc/24f1e58b-b088-4195-ba46-839e73aec371/406eb232-0f42-45b3-8f82-5ddbf95d3c28/4526622a-5e47-4913-897d-b139c3f50e94/attachment?id=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
2024-03-28 14:21:08 +01:00
Info
Malicious
  • Yara
  • Sigma
Strela Stealer
AV: 35%
1239840531439025921.js
2024-03-28 14:20:23 +01:00
Info
Class
Suspicious
https://www.wellsfargo.com/
2024-03-28 14:18:00 +01:00
Info
Class
Malicious
HTMLPhisher
AV: 20%
https://cloudflare-ipfs.com/ipfs/QmWogjL6GutGKbdVU2x417hXn56fpyEV8KCHFJUBJrcBaA/#hello@domain.com
2024-03-28 14:14:20 +01:00
Info
Class
Clean
midyear_statement.exe
2024-03-28 14:03:07 +01:00
No classification & info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column