You are here

Displaying 1 - 20 of 29258

This strike sends a CryptoWall malware sample. This is actually a ransomware and upon infection it encrypts data and asks for a sum of money in order to provide the decryption key. The MD5 hash of this sample is b188a7a9de9c101aed6ecf075daf19f2. descFiller

This strike sends a TeslaCrypt malware sample. This is actually a ransomware and upon infection it encrypts data (mainly associated with computer games) and asks for a sum of money in order to provide the decryption key. The MD5 hash of this sample is f3b12a197d732cda29d6d9e698ea58bf. descFiller

This strike sends a CTB Locker malware sample. This is actually a ransomware and upon infection it encrypts data and asks for a sum of money in order to provide the decryption key. The MD5 hash of this sample is . descFiller

This strike sends a Poseidon malware sample. This is actually a Point-of-Sale (PoS) malware and upon infection it scrapes the memory of PoS terminals for credit card information and sends the data to the servers. The MD5 hash of this sample is ba6a25abdfe63764e14af492684f22f6. descFiller

This strike sends a malware sample detected by Mcafee as Artemis!E4950D3EE5B9, Kaspersky as UDS:DangerousObject.Multi.Generic, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.765203. The MD5 hash of this sample is e4950d3ee5b91ac30f5ed449001c992a.

Pages