The sample has been identified as being associated with the 'Rkor' family of malware. The sample targets Android platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-18.
The sample has been identified as being associated with the 'Disttrack' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-25.
The sample has been identified as being associated with the 'Sakurel' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-08-09.
The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-03-23.
The sample has been identified as being associated with the 'Haperlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-04-07.
The sample has been identified as being associated with the 'Emotet' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-07-03.
The sample has been identified as being associated with the 'Dridex' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-01-16.
The sample has been identified as being associated with the 'Foreign' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-06-13.
This strike sends a malware sample known as Zeus. Zeus is a trojan that steals information such as banking credentials using methods such as key-logging and form-grabbing. The MD5 hash of this Zeus sample is 902e65b42621a37991cf902404940aa7.
The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-04-17.
The sample has been identified as being associated with the 'Cryptodefense' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-06-26.
The sample has been identified as being associated with the 'Ramnit' family of malware. The sample platform is Document. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-08-04.
The sample has been identified as being associated with the 'TeslaCrypt' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-14.
CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
This strike exploits a vulnerability in HPs Intelligent Management Center where an unauthenticated user may download an arbitrary file.
The sample has been identified as being associated with the 'Zeus' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-05-08.
The sample has been identified as being associated with the 'Emotet' family of malware. The sample platform is Document. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-03-03.
The sample has been identified as being associated with the 'Ftcode' family of malware. The sample platform is Document. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-17.
The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-24.
The sample has been identified as being associated with the 'Lyposit' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-06-08.
The sample has been identified as being associated with the 'Emotet' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-03-11.