top title background image
Malware  Trends
flash
Not found what you are looking for? Try:  Advanced Search

(limited to max. 20 search results)


Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 44%
009.vbe
2025-01-15 21:26:23 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer
AV: 57%
DCV78I939025789245.scr.exe
2025-01-15 17:34:07 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 25%
58955, ZN25888A – drawing.pif.exe
2025-01-15 13:20:12 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 5%
0969686.vbe
2025-01-15 10:19:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 44%
NEW SHIPPING DOCUMENTS.exe
2025-01-15 08:39:13 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 38%
new order.exe
2025-01-15 08:32:05 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 37%
Debit note -MSR_2024_0024- and Attachments.com.exe
2025-01-14 19:17:07 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 2%
009.vbe
2025-01-14 08:46:08 +01:00
Info
Class
Malicious
  • Yara
AgentTesla
AV: 39%
rordendecompra_.exe
2025-01-13 18:31:06 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 30%
new order 4504333579.com.exe
2025-01-13 13:14:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 36%
rRef6010273.exe
2025-01-13 11:00:09 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla
AV: 71%
invnoIL438805.exe
2025-01-13 10:08:10 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 46%
Shipping Docs Waybill No 2009 xxxx 351.exe
2025-01-13 08:16:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 71%
rCHARTERREQUEST.exe
2025-01-13 03:00:08 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla, PureLog Stealer
AV: 79%
kAsh3nmsgs.exe
2025-01-11 08:43:20 +01:00
Info
Class
Malicious
  • Yara
AgentTesla
AV: 83%
F0DgoRk0p1.exe
2025-01-11 07:52:19 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
  • Suricata
AgentTesla
AV: 75%
dhPWt112uC.exe
2025-01-11 07:47:24 +01:00
Info
Class
Malicious
  • Yara
AgentTesla
AV: 79%
fpY3HP2cnH.exe
2025-01-11 07:41:24 +01:00
Info
Class
Malicious
  • Yara
  • Suricata
AgentTesla
AV: 79%
4287eV6mBc.exe
2025-01-11 07:12:16 +01:00
Info
Class
Malicious
  • Yara
  • Sigma
AgentTesla, DarkTortilla
AV: 71%
DUWPFaZd3a.exe
2025-01-11 06:53:19 +01:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column