The sample has been identified as being associated with the 'Zeus' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2023-05-31.
The sample has been identified as being associated with the 'SLocker' family of malware. The sample targets Android platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2018-08-20.
The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2018-10-17.
The sample has been identified as being associated with the 'Gamarue' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2018-12-15.
The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-05-15.
The sample has been identified as being associated with the 'Virlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2019-01-20.
The sample has been identified as being associated with the 'Virlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2019-02-18.
The sample has been identified as being associated with the 'ChewBacca' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2019-03-17.
The sample has been identified as being associated with the 'Virlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2019-04-13.
The sample has been identified as being associated with the 'Disttrack' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-06-23.
The sample has been identified as being associated with the 'Disttrack' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-03-30.
The sample has been identified as being associated with the 'Xtreme' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2019-07-23.
The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-09-11.
The sample has been identified as being associated with the 'DustySky' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2019-10-31.
The sample has been identified as being associated with the 'ChewBacca' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2019-12-12.
CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
An stack buffer overflow vulnerability exists in Microsoft Office Publisher that could allow a remote attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to the way Publisher parses certain values in a Microsoft Publisher file. Remote attackers could exploit this vulnerability by enticing the target user to open a malicious file. Successful exploitation could result...
This strike sends a malware sample detected by Mcafee as 'Skintrim.gen.c', Microsoft as 'TrojanDownloader:Win32/Wintrim.BF', Kaspersky as 'Packed.Win32.Hrup.b', Symantec as 'Trojan.Skintrim!gen3', Bitdefender as 'Gen:Variant.Adware.NaviPromo.2'.
This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.
This strike sends a malware sample known as PyXie RAT. PyXie is a Python Remote Access Trojan. It has been seen in the wild since 2018, and is typically seen in conjunction with Cobalt Strike beacons. PyXie has been used to deliver ransomware attacks to the healthcare and education industries.
The sample has been identified as being associated with the 'TrickBot' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2023-07-02.
Pages