top title background image
Malware  Trends
flash

Detection Sample Info Download Report Classification & Info Graph
Malicious
  • Snort
http://apidevst.com
2024-05-06 05:31:31 +02:00
Info
Malicious
http://42.193.252.92:2095/
2024-05-06 05:30:11 +02:00
Info
Class
Clean
JJs Waste & Recycling.doc
2024-05-06 05:26:10 +02:00
Info
Malicious
  • Sigma
  • Snort
AV: None
https://103.150.10.45:8443/
2024-05-06 05:21:18 +02:00
Info
Clean
https://s1.sportea.link/live/embed.php?ch=ch10
2024-05-06 04:57:48 +02:00
Info
Malicious
  • Yara
  • Sigma
  • Snort
Xmrig
AV: 70%
5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.zip
2024-05-06 04:55:21 +02:00
Info
Class
Clean
5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.zip
2024-05-06 04:50:50 +02:00
No classification & info
Incomplete analysis
AV: None
http://morestrategic11688.lt.emlnk9.com
2024-05-06 04:46:25 +02:00
Info
Clean
http://arvigorothan.com/tag.min.js
2024-05-06 04:26:09 +02:00
No classification & info
no
Graph
Clean
http://ak-static.snackvideo.in/udata/pkg/kwaioverseaserver/commentsurprisesceneidnendofyear.zip
2024-05-06 04:21:44 +02:00
Info
Clean
http://kucoin-intl.com
2024-05-06 04:10:56 +02:00
No classification & info
no
Graph
Malicious
  • Yara
LummaC
AV: 47%
payload.exe
2024-05-06 03:48:04 +02:00
Info
Class
Malicious
https://cdn.pixelbin.io/v2/dummy-cloudname/original/__logos__/upscale_media/um_logo_light.png
2024-05-06 03:13:31 +02:00
Info
Malicious
  • Yara
RisePro Stealer
AV: 68%
9vZbHuuOq6.exe
2024-05-06 02:58:08 +02:00
Info
Class
Malicious
  • Yara
  • Snort
Mars Stealer, Stealc, Vidar
AV: 71%
FFAk2gixx5.exe
2024-05-06 02:51:03 +02:00
Info
Class
Malicious
  • Yara
  • Sigma
XWorm
AV: 50%
Stub_CashRAT.exe
2024-05-06 02:46:06 +02:00
Info
Class
Malicious
  • Yara
PureLog Stealer, TrojanRansom, zgRAT
AV: 46%
CashRansomware.exe
2024-05-06 02:41:06 +02:00
Info
Class
Malicious
  • Yara
MofongoLoader
AV: 14%
73zGJqwgDy.exe
2024-05-06 02:34:04 +02:00
Info
Class
Malicious
  • Yara
MofongoLoader
AV: 13%
J5kltefeTK.exe
2024-05-06 02:33:09 +02:00
Info
Class
Malicious
  • Yara
MofongoLoader
AV: 5%
qxn9Zvy1at.exe
2024-05-06 02:33:09 +02:00
Info
Class
Windows: InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files Contains malware configuration(s)
Customization Show ID column