flash

Result Threat Antivirus Icon Time & Date Name Info Class Graph Actions
malicious
AgentTesla
24%
02.12.2021 20:21:13
winlogon.exe
malicious
AgentTesla
None
02.12.2021 20:16:13
Waybilldoc_220950655.pdf.exe
malicious
AgentTesla
66%
02.12.2021 19:23:46
Dhl Document 7348255141.exe
malicious
AgentTesla
33%
02.12.2021 19:17:19
Image001.exe
malicious
AgentTesla
57%
02.12.2021 18:49:28
Dhl Document.exe
malicious
AgentTesla
31%
02.12.2021 18:37:28
DHL Waybill receipt.exe
malicious
AgentTesla
None
02.12.2021 18:20:28
PO4567328901.exe
malicious
AgentTesla
62%
02.12.2021 16:39:32
Invoice_PDF.exe
malicious
AgentTesla
62%
02.12.2021 16:39:32
MV THALASSINI (EX- OCEAN LORD).doc.exe
malicious
AgentTesla
62%
02.12.2021 16:39:32
New Order.exe
malicious
AgentTesla
41%
02.12.2021 16:39:31
new order TRICOLOR-6.45 TRICOLOR-6.3 TRICOLOR-8.1 TRICOLOR-7.66.......exe
malicious
AgentTesla
31%
02.12.2021 16:30:22
CO DRAFT Al Zaytounah project.exe
malicious
AgentTesla
0%
02.12.2021 16:25:19
Bank payment swift message.exe
malicious
AgentTesla
64%
02.12.2021 15:43:20
OSCBLUS33XXX1032021110200150939.exe
malicious
AgentTesla
44%
02.12.2021 15:40:24
PO02673492.exe
malicious
AgentTesla
14%
02.12.2021 15:40:24
Shipping Document BL Copy.exe
malicious
AgentTesla
68%
02.12.2021 15:34:56
PTA009483.exe
malicious
AgentTesla
82%
02.12.2021 15:33:20
SALES INVOICE-CINV-00095891.exe
malicious
AgentTesla
36%
02.12.2021 15:04:21
Purchase Order No. XIV21623..exe
malicious
AgentTesla
41%
02.12.2021 15:03:15
New Order4687334.exe
Windows:
InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files