top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
http://digijmres-178-243-225-173.digicelbroadband.com
2024-04-19 19:37:37 +02:00
Info
Malicious
  • Yara
MicroClip
AV: 58%
z47Danfe-Pedido17042024.msi
2024-04-19 19:35:06 +02:00
Info
Class
Malicious
AV: 61%
werkernel.exe
2024-04-19 19:33:04 +02:00
Info
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer
AV: 66%
rTDN001-180424_PDF.scr.exe
2024-04-19 19:32:08 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AgentTesla
AV: 71%
z1E-catalogSamples.exe
2024-04-19 19:32:08 +02:00
Info
Class
Malicious
AZORult++
AV: 53%
SecuriteInfo.com.Win32.TrojanX-gen.14399.1813.exe
2024-04-19 19:29:07 +02:00
Info
Class
Clean
Urgence .xlsx
2024-04-19 19:27:46 +02:00
Info
Malicious
  • Yara
  • Snort
HTMLPhisher
AV: None
https://url.us.m.mimecastprotect.com/s/kCCtC5yEz0tWp5ANrfz_KPV?domain=paplastics365-my.sharepoint.com
2024-04-19 19:27:21 +02:00
Class
no
Graph
Clean
https://www.easeus.com/thankyou/install-data-recovery-wizard-trial.htm?linkid=brand_install_drwtrial%5C
2024-04-19 19:24:25 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Snort
GCleaner
AV: 42%
xQXHoWMKoa.exe
2024-04-19 19:24:05 +02:00
Info
Class
Clean
https://www.dropbox.com/l/scl/AAA6L-52SA1qcSNaSUSzClMI0t2MKWzWEHQ
2024-04-19 19:23:55 +02:00
Info
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 68%
rJlMhHdHP2mDzMGx.exe
2024-04-19 19:19:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
AgentTesla
AV: 76%
rRECEIPTTRANSFE.exe
2024-04-19 19:19:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
GuLoader, Remcos
AV: 34%
z42MNA2024000000041-KWINTMADI-11310Y_K.exe
2024-04-19 19:19:07 +02:00
Info
Class
Clean
https://url.us.m.mimecastprotect.com/s/kCCtC5yEz0tWp5ANrfz_KPV?domain=paplastics365-my.sharepoint.com
2024-04-19 19:18:16 +02:00
Info
Clean
Cybersecurity Course Mapping- FY24H2+.xlsx
2024-04-19 19:13:36 +02:00
No classification & info
no
Graph
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 24%
1iO53raUh69l6nV.exe
2024-04-19 19:13:04 +02:00
Info
Class
Clean
https://sg.bill.com/ls/click?upn=u001.se4SimOEkqgQ32qtQ-2B6PfF-2BlckyIfjzKdKf1PBLeQckDBbiiEJ4gz5iO9-2BpXek1-2B3otAacrmYxhR966aabVpbDjXPB0TDcVPVn5-2BSHbuJQeEQvBxotdNmZ4LgcM8xZ4YPxUi-2F8XqgNvrSYdw-2Fmxh5w-3D-3DYY2K_Al3xtsw1nJFvX1W10ljfOePEesWqCqLbRGsuUobb0EvSdIVOtXzuya4yiEYliO-2FfKOMGQeBRlJ9M3ZXBJdkzdQRxucC268RcCOMmI9TTQp-2F783KjuaOltQwkBR6FNxcEc2XtuO70ogm3g2T6tXMUdYAxoDlH-2BjtodkwjtrKRb5sX8if4UvbrVedFZYum9iOCxM4DsL1fCZ761L1eNwWJNSHjvslJH-2FvnIC-2FOT-2FM2mBI-3D
2024-04-19 19:12:52 +02:00
Info
Clean
https://visit.samsungshi.com/visit/HRVO3001.do
2024-04-19 19:12:37 +02:00
Info
Malicious
AV: 21%
z74Danfe-Pedido18042024.msi
2024-04-19 19:11:10 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column