Unlock the future of Extended Malware Analysis

The cutting-edge solution designed for cybersecurity experts. Experience unparalleled speed and accuracy through our advanced static and structural analysis methods. Malva.RE excels in deconstructing malware encapsulated in known formats, simplifying the workflow for professionals and enhancing their efficiency.

Sample Description Type / Size Tags
Malicious
Malicious
f37e7d37a118f1b76dc56fedf4f2820c

MD5: f37e7d37a118f1b76dc56fedf4f2820c

SHA256: a2185f723af4f4e6daf60350bb74d3747d6c9af51a[...]d7e

Portable Executable file

139.26 KB

Stealer
Vidar Stealer
Executable
PE (Portable Executable)
PE Memory-Mapped (Dump)
+3
Malicious
Malicious
9c6c89d909170a8aa7a06c657f8c6c56

MD5: 9c6c89d909170a8aa7a06c657f8c6c56

SHA256: 59374902866a6c62f56f32bdfd15a3a3215ec8d6bd[...]998

C2: 151.243.109.36

Portable Executable file

86.53 KB

Executable
PE (Portable Executable)
Managed .NET
PE File Layout
Win 32 Exe
+5
Malicious
Malicious
2e2436f5497f7442260593e23ff929be

MD5: 2e2436f5497f7442260593e23ff929be

SHA256: 4aca40c10f8129e3009f07ecd73f9c2d2e170d6129[...]df6

Portable Executable file

644.1 KB

Executable
PE (Portable Executable)
Managed .NET
PE File Layout
Win 32 Exe
+5
Malicious
Malicious
a77d883ece1dd996267fbd01349f48d8

MD5: a77d883ece1dd996267fbd01349f48d8

SHA256: cdde3b2650c951e774a8694208c0d151e91b40db5d[...]dec

C2: 8.tcp.cpolar.top

Portable Executable file

31.23 KB

Executable
PE (Portable Executable)
Managed .NET
PE File Layout
Win 32 Exe
+5
Malicious
Malicious
015ed9ba71f8e578b71f553ceefc85f3

MD5: 015ed9ba71f8e578b71f553ceefc85f3

SHA256: b954d66d6cb60a558efff4eb514a87f3ca4e657053[...]60f

VBScript file

3.03 MB

PowerShell
Powershell: Hidden Execution
Batch Command
PowerShell Call
Scripting.FileSystemObject
+5
An error has occurred. This application may no longer respond until reloaded. Reload 🗙