Analysis Report
Bitcoin miner, overwrites Adobe Reader Update for persistence starts
MD5:
52e10c90700a37a33a132d8e67120f39
Analysis Report
VBA document dropping Empire via HTA, decoy targeting Spiez Convergence in Switzerland
MD5:
0e7b32d23fbd6d62a593c234bafa2311
Analysis Report
Word document, OLE reference to external RTF, CVE 2017-11882, TrickBot
MD5:
70162476205496513fd88e9069372e53
Analysis Report
SynAck Ransomware using Doppelgänging injection technique
MD5:
6f772eb660bc05fc26df86c98ca49abc
Analysis Report
Lokibot dropping Adwind RAT
MD5:
d87bda9120de373ab47fe445b99b6298
Analysis Report
Netflix Phishing
hxxp://confirm-your-info-51783[.]confiry0[.]beget[.]tech/151604749699341/nfx/
Analysis Report
Zeus Panda e-Banking trojan
MD5:
a77ad824e5058d6504a791d0289ffc3d
Analysis Report
Hacking Team Remote Control System Spyware
MD5:
c0618556e9ef16b35b042bc29aeb9291
Analysis Report
Hacking Team Remote Control System Spyware
MD5:
c0618556e9ef16b35b042bc29aeb9291
Analysis Report
Malicious office document targeting several government entities, dropping Sofacy
MD5:
56f98e3ed00e48ff9cb89dea5f6e11c1
Analysis Report
Excel sheet exploiting Adobe Flash Player vulnerability CVE-2018-4878
MD5:
5f97c5ea28c0401abc093069a50aa1f8
Analysis Report
Turla / KopiLuwak Backdoor
MD5:
7c378d78b7a89aef27e8a3c5066b8511
Analysis Report
RTF exploiting CVE 2017-11882
MD5:
11f71f387e87bbb2b97b6c27f78320e4
Analysis Report
Bad Rabbit new version of NotPetya
MD5:
fbbdc39af1139aebba4da004475e8839
Analysis Report
Emotet Banking Trojan
hxxp://austinfilmschool.org/Invoice-Dated-17-Oct-17-372510608/VR-AOFGB/2017/
Analysis Report
CVE-2017-8759 dropping FinFisher / FinSpy
MD5:
24a3d1d2f36824dfa190d8f93da26432
Analysis Report
AES based Phishing Page for Office 360
hxxps://login.microsoftonlineoww.recentviralvideos.com
Analysis Report
New Locky Ransomware Diablo6 Variant
MD5:
544bc1c6ecd95d89d96b5e75c3121fea
Analysis Report
Petya Ransomware loaded with EternalBlue SMBv1 Exploit
MD5:
71b6a493388e7d0b40c83ce903bc6b04
Analysis Report
PPS Lure, using HREF Mouse Over to drop payloads
MD5:
823c408af2d2b19088935a07c03b4222
Analysis Report
Malicious Word document, CVE-2017-0199, dropping Dridex e-Banking trojan
MD5:
8b6f6bdefdc6b42abf9f372123152ab2
Analysis Report
Nice powershell analysis of Locky & Konvter
MD5:
2161f8cf7b6c1a1a3a6fdc41083566a5
Analysis Report
Office Document Spear Phish target Mongolian Government
MD5:
614875cf37898562aa115a64f17b0117
Analysis Report
Digitally signed VBA dropper, nice VBA analysis
MD5:
2b83bd1d97eb911e9d53765edb5ea79e
Analysis Report
Malicious document using Macro / Shellcode to drop files (Hancitor dropper)
MD5:
85965f7ce5e44f1836ebcaff4a8aef31
Analysis Report
Analyis of malicious document using ENIGMA0X3 UAC Bypass
MD5:
1144eeaebb15044fa64f4d9bb5670349
Analysis Report
Macro based downloader, drops ransomware, uses ScriptControl.AddCode obfuscation
MD5:
c2f43e6ef53280758b84f3beaca99b4b
Analysis Report
Macro based downloader, that utilizes bitsadmin feature to download final payload
MD5:
43b8cc7dc3ff1987354e974d77216b1b
Analysis Report
Macro Shellcode execution via EnumResourceTypes, callback
MD5:
3ebd49f7168ff668d617a174b1e7c30a
Analysis Report
e-Banking Trojan Retefe, installing fake root cert & TOR
MD5:
ff8e9c668d9bb0460029eaaca75fd498
Analysis Report
Retefe e-Banking Trojan
MD5:
0977eb0c066706384646987f9ded4e06
Analysis Report
HydraCrypt Ransomware, encryption keys / pws / settings and more
MD5:
5f2d13576e4906501c91b8bf400e0890
Analysis Report
Malicious document dropping Dridex
MD5:
439bee4cbe16605193aa73e7bb75b731
Analysis Report
UPS Invoice Spam, malicious doc dropping Dyre
MD5:
7d4fbadc67855bfece4e6dd5f07ee7f6
Analysis Report
Info Stealer, PE file in BAT trick
MD5:
6071a0cf7861302564bd4fc44396e7a4
Analysis Report
Dyre, e-Banking trojan, ready to go for Microsoft Edge Browser
MD5:
ad0d7d0903cb059b87892a099fe21d7e
Analysis Report
Trojan including many evasion tricks
MD5:
40D19FBA73C6B011814E2C6920E8792F
Analysis Report
Cidox/Rovnix Bootkit Analysis
MD5:
cbdda646a20d95f078393506ecdc0796
Analysis Report
Rombertik Analysis, Analysis Detection Based on PE Resource Hash, overwrites MBR
MD5:
f504ef6e9a269e354de802872dc5e209
Analysis Report
Rombertik Analysis with many anti analysis tricks
f504ef6e9a269e354de802872dc5e209
Analysis Report
Nice Rootkit Analysis of Win32.Vikim
MD5:
6f6d18dd0b2c54d34c44ff0a274399e0
Analysis Report
Malicious Office Document using heavy obfuscation
MD5:
3aa72aacd5b215b6003d6b408fc65b33
Analysis Report
Evasive sample executing only at specific dates
MD5:
0af4ef5069f47a371a0caf22ae2006a6
Analysis Report
Evasive sample checking mouse and cursor movement
MD5:
3616a11fa463644fa20d2317c5971378
Analysis Report
Evasive sample detecting Joe Sandbox by looking at the installed software
MD5:
d80e956259c858eaccb53c1affaf8141
Analysis Report
Nice Ransomlocker analysis
MD5:
49ad164c1f4785fd7b092fd1456d7a10
Analysis Report
Browse of URL found in malicious Word document, drops ransomware
URL analysis
Analysis Report
Word with embedded VBA macro, needs user actions to trigger
MD5:
7ed4999012308d6f63abd7652a9f1ac0
Analysis Report
Stealth doc dropping Trojan Dridex
MD5:
d221ab599418bbc890cf3f515babb287
Analysis Report
Dyre Banking Trojan Analysis
MD5:
08cea5ca7a6c1bceebe4adc7fd9404d1
Analysis Report
Nice Zeus Banking Trojan Analysis
MD5:
4d08934bd040ed25dfa46542e396cb05
Analysis Report
Nice CBT Ransomware Locker Analysis
MD5:
521BD488A5DE44D84E9D145D3EB8A238
Analysis Report
VPNFilter Bot APT, Stage 1
MD5:
5f358afee76f2a74b1a3443c6012b27b
Analysis Report
VPNFilter Bot APT, Stage 2
MD5:
87049e223dd922dc1d8180c83e2fde77
Analysis Report
VPNFilter Bot APT, Stage 2 (debug version)
MD5:
87049e223dd922dc1d8180c83e2fde77
Analysis Report
VPNFilter Bot APT, Stage 3 (tor plugin)
MD5:
b5dc976043db9b42c9f6fa889205c68a
Analysis Report
OSX Proton in Supply Chain Attack (Elmedia Player)
MD5:
29fb77664fc4f13ea5f65cfe01b292af
Analysis Report
Trojan OSX Snake aka Turla
MD5:
000e4225f382f9eee675dcaf3cbf9c7e
Analysis Report
iKitten / Macdownloader, Spyware
MD5:
787d664e842961f2a335139407f91a70
Analysis Report
Malicious Office document creating a Reverse Shell via VBA Macro
MD5:
952a36f4231c8628acea028b4145daec
Analysis Report
Trojan xslcmd (with keylogger detection)
MD5:
60242ad3e1b6c4d417d4dfeb8fb464a1
Analysis Report
Roaming Mantis Android banking Trojan
MD5:
03108e7f426416b0eaca9132f082d568
Analysis Report
Skygofree, Trojan / Spyware
MD5:
39fca709b416d8da592de3a3f714dce8
Analysis Report
Coin Miner via CoinHive Javascript
MD5:
fc1e08187de3f4b7cb52bd09ea3c2594
Analysis Report
DoubleLocker Android Ransomware
MD5:
85cfbd81ff6729927c968fbbb2d1d84d
Analysis Report
SonicSpy Android Trojan / Bot
MD5:
544bc1c6ecd95d89d96b5e75c3121fea
Analysis Report
Trojan BankBot, stealing credit card and login data
MD5:
beee6b598d006a6f6fc93f6b8764715f
Analysis Report
Trojan GT!tr.spy, stealing credit card and login data
MD5:
d9192d7713df3029b9ba393683cb90a7
Analysis Report
Overlay e-Banking Malware
MD5:
bee3746684b072867a5b202bfc5527dd
Analysis Report
VPNFilter Bot APT, Stage 1
MD5:
5f358afee76f2a74b1a3443c6012b27b
Analysis Report
VPNFilter Bot APT, Stage 2
MD5:
87049e223dd922dc1d8180c83e2fde77
Analysis Report
VPNFilter Bot APT, Stage 2 (debug version)
MD5:
87049e223dd922dc1d8180c83e2fde77
Analysis Report
VPNFilter Bot APT, Stage 3 (tor plugin)
MD5:
b5dc976043db9b42c9f6fa889205c68a