top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Clean
MDE_File_Sample_a8068703372ae00821df45d3d1e83528d5b75530.zip
2024-04-26 07:26:31 +02:00
Info
Malicious
https://4yu76uyd4.best/ccon/
2024-04-26 07:11:31 +02:00
Info
Malicious
HtmlDropper, HTMLPhisher
AV: 0%
http://callumsyed.net/
2024-04-26 07:08:50 +02:00
Info
Class
Incomplete analysis
http://agent-data.service.itsupport247.net
2024-04-26 06:34:01 +02:00
Info
Malicious
  • Yara
HTMLPhisher
AV: 10%
no Icon
DOC-Zcns1G_.html
2024-04-26 06:31:54 +02:00
Class
no
Graph
Malicious
  • Yara
HTMLPhisher
AV: 10%
DOC-Zcns1G_.html
2024-04-26 06:28:23 +02:00
Info
Class
Malicious
  • Yara
HTMLPhisher
AV: 10%
no Icon
DOC-Zcns1G_.html
2024-04-26 06:27:13 +02:00
Info
Class
Clean
http://www.painrehabilitation.com.au/contact.html
2024-04-26 06:09:55 +02:00
Info
Clean
http://www.jszwfw.gov.cn
2024-04-26 06:03:07 +02:00
Info
Malicious
https://shorturl.at/lMOT7
2024-04-26 05:56:59 +02:00
Info
Malicious
https://therufus.org/download.php
2024-04-26 05:52:48 +02:00
Info
Class
Clean
https://links.therednewsnetwork.com/clk/1514/15693/5279343/09d5c9c7fc11f02b604d1b13cb3203c680441c80/54f017f71420ee7504ac1120c9838ac98be23553/aHR0cHM6Ly9ycy1zdHJpcGUudGhlcmVkbmV3c25ldHdvcmsuY29tL3N0cmlwZS9yZWRpcmVjdD9jc19lbWFpbD10b255LmRAZWxkZXJzLmNvbS5hdSZjc19zdHJpcGVpZD0xMjg0NDgmY3Nfc2VuZGlkPUFwcmlsIDIzcmQsIDIwMjQmY3Nfb2Zmc2V0PTAmY3NfZXNwPW1hcm9wb3N0
2024-04-26 05:49:05 +02:00
Info
Malicious
  • Yara
  • Snort
LummaC
AV: 42%
VoGtelkHSn.exe
2024-04-26 05:43:06 +02:00
Info
Class
Malicious
  • Yara
  • Snort
RisePro Stealer
AV: 48%
j1zkOQTx4q.exe
2024-04-26 05:43:05 +02:00
Info
Class
Clean
YGPRDS01_2024-04-26_03_35_12.538 (1).zip
2024-04-26 05:36:59 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Snort
DCRat, PureLog Stealer, zgRAT
AV: 83%
yX8787W7de.exe
2024-04-26 05:16:05 +02:00
Info
Class
Malicious
https://mcas-proxyweb.mcas.ms/certificate-checker?login=false&originalUrl=https%3A%2F%2Fapc01.safelinks.protection.outlook.com.mcas.ms%2F%3Furl%3Dhttps%253A%252F%252Fmyapps.microsoft.com%252Fsignin%252F08558f59-9161-41fc-88b3-f0434087a79c%253FtenantId%253D258ac4e4-146a-411e-9dc8-79a9e12fd6da%26data%3D05%257C01%257Cgary.fabrizio1%2540Service.wipro.com%257C8a0e1c61209e469846ba08dbe05e2370%257C258ac4e4146a411e9dc879a9e12fd6da%257C0%257C0%257C638350467206547446%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3Dp0jrjFUb%252Fusi2RID%252FGIlCE82AM9dEDuVAB4PHdDC1%252F4%253D%26reserved%3D0%26McasTsid%3D20893&McasCSRF=a0328b22f805eebb5f9c68ee3df482ea7a84065b3bbced70493927bf9ce1f085
2024-04-26 05:11:13 +02:00
Info
Class
Malicious
https://mcas-proxyweb.mcas.ms/certificate-checker?login=false&originalUrl=https%3A%2F%2Fapc01.safelinks.protection.outlook.com.mcas.ms%2F%3Furl%3Dhttps%253A%252F%252Fwittywebevents.wipro.com%252Femail-analytics%252Fapi%252Ft%252Fl%253FobjId%253D637c92a3e4b00b92caee94cc%26data%3D05%257C02%257Cgary.fabrizio1%2540wipro.com%257Cb8fe953db5914d2bac8108dc65645f6b%257C258ac4e4146a411e9dc879a9e12fd6da%257C0%257C0%257C638496729264132835%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C0%257C%257C%257C%26sdata%3DX8fjcrb6FJIv3A6MeNVFttkEvMY37x2gBwDUYM2DULg%253D%26reserved%3D0%26McasTsid%3D20893&McasCSRF=a0328b22f805eebb5f9c68ee3df482ea7a84065b3bbced70493927bf9ce1f085
2024-04-26 04:58:44 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Snort
Lokibot, PureLog Stealer
AV: 32%
gunzipped.exe
2024-04-26 04:56:08 +02:00
Info
Class
Malicious
  • Yara
Okiru
AV: 23%
no Icon
RJ93lr3oq2.elf
2024-04-26 04:56:07 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column