The sample has been identified as being associated with the 'Banload' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-05-26.
The sample has been identified as being associated with the 'Ramnit' family of malware. The sample platform is Document. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-07-31.
The sample has been identified as being associated with the 'DarkSide' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-03-30.
The sample has been identified as being associated with the 'Ramnit' family of malware. The sample platform is Document. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-05-03.
The sample has been identified as being associated with the 'StopCrypt' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-01-11.
This strike exploits a buffer overflow vulnerability in Fatek Automation PLC WinProladder. The vulnerability can be triggered by enticing a user to view a specially crafted file. Exploitation of this vulnerability results in code execution
The sample has been identified as being associated with the 'Zeus' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-05-08.
The sample has been identified as being associated with the 'Ftcode' family of malware. The sample platform is Document. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-17.
The sample has been identified as being associated with the 'Stop' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-08-31.
CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
There exists a vulnerability in the ICQPhone.SipxPhoneManager ActiveX control embedded in the AOL ICQ product. The flaw is due to improper handling of the parameters passed to the DownloadAgent function of the affected ActiveX control. By sending a crafted message, a remote attacker may execute arbitrary code with the privileges of the currently logged on user. Upon a successful attack, the behaviour...
The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-01-24.
The sample has been identified as being associated with the 'Turnedup' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-12.
The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-31.
The sample has been identified as being associated with the 'TrickBot' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-08-16.
The sample has been identified as being associated with the 'Rkor' family of malware. The sample targets Android platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-08-07.
The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-02-07.
The sample has been identified as being associated with the 'Virlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-24.
The sample has been identified as being associated with the 'Emotet' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-06-02.
The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-04-04.
The sample has been identified as being associated with the 'Sakurel' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-10.
Pages