malshare.com
Open in
urlscan Pro
165.227.140.60
Public Scan
URL:
https://malshare.com/
Submission: On May 25 via manual from IL — Scanned from IL
Submission: On May 25 via manual from IL — Scanned from IL
Form analysis
2 forms found in the DOMPOST auth.php
<form class="navbar-form navbar-right" method="post" action="auth.php">
<input class="form-control" type="text" placeholder="API Key" aria-label="login" name="api_key">
<button class="btnbtn-small btn-success " type="submit">Login</button>
</form>
GET search.php
<form method="get" action="search.php" id="search_form" class="form-search" onsubmit="ShowLoading()">
<label class="lead" for="inputSearch">Quick Search: </label>
<input type="text" name="query" id="inputSearch" class="input-xxlarge">
<button type="submit" class="btn">Search</button>
</form>
Text Content
MalShare * Home * Upload * Search * Download * Register * API * About Login Quick Search: Search Recently added Samples SHA256 Hash File type Added Source Yara Hits 83e339ff7b79d7ca6afdc73bf17197601be8472aa61351446a29413e95a467cc Zip 2024-05-25 20:56:16 UTCUser Submission CuckooSandbox/embedded_win_api CuckooSandbox/shellcode 4ee96641b42756834975a2cd7940ff3d36132289e9f5d37867d6d1fe2ef6cef1 PE32+ 2024-05-25 18:55:08 UTCUser Submission YRP/CRC32_poly_Constant YRP/CRC32_table YRP/IP [+] YRP/contentis_base64 YRP/domain YRP/url YRP/flv YRP/excel_XML YRP/gem YRP/pgml YRP/amf YRP/x3d YRP/_3dxml YRP/DebuggerException__SetConsoleCtrl YRP/anti_dbg YRP/win_token YRP/win_files_operation YRP/android_meterpreter YRP/suspicious_packer_section YRP/Microsoft_Visual_Cpp_80 YRP/Microsoft_Visual_Cpp_80_DLL YRP/IsPE64 YRP/IsConsole YRP/IsPacked YRP/HasOverlay YRP/HasDebugData YRP/HasRichSignature d05aaf7034ee826ca815228dfa6ece82ba80485a5cae50fc4a95e00a996e1d2b MS-DOS 2024-05-25 17:45:12 UTCUser Submission CuckooSandbox/vmdetect YRP/Big_Numbers1 YRP/CRC32_poly_Constant [+] YRP/SHA512_Constants YRP/contentis_base64 YRP/domain YRP/vmdetect YRP/IsPE64 YRP/IsDLL YRP/IsWindowsGUI YRP/HasDebugData YRP/HasModified_DOS_Message 2e6ef67337ea3fdbe12a24a6e89911a9c033392ce77d69948e49294de2170994 PE32 2024-05-25 17:45:10 UTCUser Submission YRP/contentis_base64 YRP/domain YRP/Misc_Suspicious_Strings [+] YRP/DebuggerException__SetConsoleCtrl YRP/win_files_operation YRP/Borland_Cpp_DLL YRP/Borland_Cpp_for_Win32_1999 YRP/Borland_Cpp_DLL_additional YRP/Borland YRP/IsPE32 YRP/IsConsole YRP/borland_cpp ddc39b2a8a8510ffdcc019f77204317e9b706a9f3a6ea4d65fe2066dca8e8277 PE32 2024-05-25 17:45:04 UTCUser Submission YRP/CRC32_poly_Constant YRP/contentis_base64 YRP/domain [+] YRP/win_registry YRP/Str_Win32_Winsock2_Library YRP/suspicious_packer_section YRP/UPX YRP/PackerUPX_CompresorGratuito_wwwupxsourceforgenet YRP/UPX_wwwupxsourceforgenet_additional YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h YRP/UPX_290_LZMA YRP/UPX_290_LZMA_Markus_Oberhumer_Laszlo_Molnar_John_Reiser YRP/UPX_290_LZMA_additional YRP/UPX_wwwupxsourceforgenet YRP/UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser YRP/IsPE32 YRP/IsWindowsGUI YRP/IsPacked YRP/HasOverlay FlorianRoth/DragonFly_APT_Sep17_3 c46527117746e2304fa76b6dd702de117914bdf59e75c688d6af5f1fbcb60081 PE32 2024-05-25 17:45:03 UTCUser Submission YRP/CRC32_poly_Constant YRP/maldoc_getEIP_method_1 YRP/contentis_base64 [+] YRP/domain YRP/win_mutex YRP/win_registry YRP/win_files_operation YRP/Str_Win32_Wininet_Library YRP/suspicious_packer_section YRP/UPX YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h YRP/UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser YRP/IsPE32 YRP/IsWindowsGUI YRP/IsPacked YRP/HasModified_DOS_Message 99abe7535466d300f432dda0cfd7f4adc4e005055dcc28920a87226202d3800d PE32 2024-05-25 17:44:55 UTCUser Submission YRP/maldoc_getEIP_method_1 YRP/IP YRP/contentis_base64 [+] YRP/domain YRP/url YRP/Dropper_Strings YRP/disable_firewall YRP/disable_dep YRP/network_tcp_socket YRP/network_dns YRP/escalate_priv YRP/win_registry YRP/win_token YRP/win_files_operation YRP/Str_Win32_Winsock2_Library YRP/Str_Win32_Wininet_Library YRP/Str_Win32_Internet_API YRP/ASProtect_v132 YRP/IsPE32 YRP/IsWindowsGUI YRP/HasRichSignature YRP/IsSuspicious 23c37f3757fa1084e5938db3d54d6affb8e8ce3b243726c1d239b868b7fad20b PE32 2024-05-25 17:44:47 UTCUser Submission YRP/maldoc_getEIP_method_1 YRP/contentis_base64 YRP/domain [+] YRP/DebuggerCheck__QueryInfo YRP/disable_dep YRP/inject_thread YRP/network_udp_sock YRP/network_tcp_socket YRP/network_dns YRP/escalate_priv YRP/win_mutex YRP/win_registry YRP/win_token YRP/win_files_operation YRP/Str_Win32_Winsock2_Library YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h YRP/IsPE32 YRP/IsDLL YRP/IsWindowsGUI YRP/IsPacked YRP/HasOverlay YRP/HasRichSignature 504d9f69149a711e93bbe7315a157c8e2fda25332295d7a1b92299c3c62ac702 PE32 2024-05-25 17:44:38 UTCUser Submission YRP/maldoc_getEIP_method_1 YRP/contentis_base64 YRP/domain [+] YRP/url YRP/win_mutex YRP/win_registry YRP/win_files_operation YRP/Str_Win32_Wininet_Library YRP/AHTeam_EP_Protector_03_fake_PCGuard_403_415_FEUERRADER YRP/IsPE32 YRP/IsWindowsGUI YRP/HasOverlay YRP/HasModified_DOS_Message 0f52ca65964e394fb90ce2ecf889aadfad8041e6d8be28e3c383b1cab7b5dbcc MS-DOS 2024-05-25 17:44:35 UTCUser Submission CuckooSandbox/vmdetect YRP/Big_Numbers1 YRP/CRC32_poly_Constant [+] YRP/SHA512_Constants YRP/contentis_base64 YRP/domain YRP/vmdetect YRP/IsPE64 YRP/IsDLL YRP/IsWindowsGUI YRP/HasDebugData YRP/HasModified_DOS_Message © 2013 - 2024 MalShare | Terms of Service | Sitemap |