top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
Installer.bat
2024-04-19 11:27:40 +02:00
Info
Malicious
remcmdstub.exe
2024-04-19 11:27:29 +02:00
Info
Clean
https://we.tl/t-7YLYbmynt5
2024-04-19 11:17:59 +02:00
No classification & info
no
Graph
Clean
no Icon
KFcLqcopfe
2024-04-19 11:15:48 +02:00
Info
Clean
https://we.tl/t-7YLYbmynt5
2024-04-19 11:15:14 +02:00
No classification & info
no
Graph
Malicious
  • Yara
HTMLPhisher
AV: 0%
no Icon
New Voicemail_Daiichi-Sankyo.html
2024-04-19 11:12:27 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 32%
HmGUCvTQIacWu7Q.exe
2024-04-19 11:12:07 +02:00
Info
Class
Clean
https://signsandlighting.com/cb/#dmFuZXNzYS5jaWV0ZXJzQGRhaWljaGktc2Fua3lvLmJlDQ==
2024-04-19 11:06:45 +02:00
Info
Malicious
http://www.pdfconvertercompare.com
2024-04-19 10:59:47 +02:00
Info
Clean
https://e.trustifi.com/#/fff3a6/655618/6b960b/eb6fbf/0f1f42/43c464/f0c790/c3ed4c/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/d0892c/c03583/d792ff/b0a902/7344c5/9089ad/a64a03/f70840/3edfe8/f48740/
2024-04-19 10:59:17 +02:00
Info
Suspicious
Project1.exe
2024-04-19 10:58:02 +02:00
Info
Class
Clean
Quarantined Messages (3).zip
2024-04-19 10:53:33 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Snort
GuLoader, Remcos
AV: 27%
UMMAN İHRACAT AFR5641 910-1714 1633.exe
2024-04-19 10:53:07 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer, RedLine
AV: 47%
%01% (2).exe
2024-04-19 10:52:07 +02:00
Info
Class
Clean
https://onenote-officemicrosoft.powerappsportals.com/
2024-04-19 10:51:06 +02:00
Info
Clean
https://e.trustifi.com/#/fff3a6/655618/6b960b/eb6fbf/0f1f42/43c464/f0c790/c3ed4c/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/d0892c/c03583/d792ff/b0a902/7344c5/9089ad/a64a03/f70840/3edfe8/f48740/188427/64d9f7/cab2a0/c44699/8b765a/884f60/ce333e/2c5214/fa6702/302b17/38582c/646c1b/fb8b06/d6edeb/56a3e6/672394/c27a09/e6d646/b9ddef/3e07c7/c42d28/925075/7b2893/5b4b08/fc5ba8/cb782e/eecc32/6a1293/8e148c/44f9f8/b0d79a/545d82/02fd7e/daf50d/936b66/a4721c/5b7c73/f49c03/05806e/4d0241/539889/dbbc72/2a54e5/e7bbe9/7cfe1f/41d162/f3d716/7770e0/8a5f9a/d6cd2f/514300/a9f445/44ef37/fdbfa3/bbc94e/8426f0/2a50f4/b74d8f/8abd9a/1f21db/5ab3a4/28a46e/f49b91/4c2a46/493c50/594f8b
2024-04-19 10:49:40 +02:00
Info
Malicious
  • Yara
AV: 68%
no Icon
l1uxT537eS.elf
2024-04-19 10:49:09 +02:00
Info
Malicious
  • Yara
  • Snort
Mirai
AV: 68%
no Icon
7oIrVgpQFQ.elf
2024-04-19 10:49:09 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Mirai
AV: 68%
no Icon
n4J9NMfLTM.elf
2024-04-19 10:49:06 +02:00
Info
Class
Clean
https://e.trustifi.com/#/fff3a6/655618/6b960b/eb6fbf/0f1f42/43c464/f0c790/c3ed4c/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/d0892c/c03583/d792ff/b0a902/7344c5/9089ad/a64a03/f70840/3edfe8/f48740/188427/64d9f7/cab2a0/c44699/8b765a/884f60/ce333e/2c5214/fa6702/302b17/38582c/646c1b/fb8b06/d6edeb/56a3e6/672394/c27a09/e6d646/b9ddef/3e07c7/c42d28/925075/7b2893/5b4b08/fc5ba8/cb782e/eecc32/6a1293/8e148c/44f9f8/b0d79a/545d82/02fd7e/daf50d/936b66/a4721c/5b7c73/f49c03/05806e/4d0241/539889/dbbc72/2a54e5/e7bbe9/7cfe1f/41d162/f3d716/7770e0/8a5f9a/d6cd2f/514300/a9f445/44ef37/fdbfa3/bbc94e/8426f0/2a50f4/b74d8f/8abd9a/1f21db/5ab3a4/28a46e/f49b91/4c2a46/493c50/594f8b
2024-04-19 10:48:19 +02:00
Info
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column