malshare.com Open in urlscan Pro
165.227.140.60  Public Scan

URL: https://malshare.com/
Submission: On May 25 via manual from IL — Scanned from IL

Form analysis 2 forms found in the DOM

POST auth.php

<form class="navbar-form navbar-right" method="post" action="auth.php">
  <input class="form-control" type="text" placeholder="API Key" aria-label="login" name="api_key">
  <button class="btnbtn-small  btn-success " type="submit">Login</button>
</form>

GET search.php

<form method="get" action="search.php" id="search_form" class="form-search" onsubmit="ShowLoading()">
  <label class="lead" for="inputSearch">Quick Search: </label>
  <input type="text" name="query" id="inputSearch" class="input-xxlarge">
  <button type="submit" class="btn">Search</button>
</form>

Text Content

    MalShare
 * Home
 * Upload
 * Search
 * Download
   
 * Register
   
 * API
 * About

Login
Quick Search: Search

Recently added Samples

SHA256 Hash File type Added Source Yara Hits
83e339ff7b79d7ca6afdc73bf17197601be8472aa61351446a29413e95a467cc
Zip 2024-05-25 20:56:16 UTCUser Submission CuckooSandbox/embedded_win_api
CuckooSandbox/shellcode
4ee96641b42756834975a2cd7940ff3d36132289e9f5d37867d6d1fe2ef6cef1
PE32+ 2024-05-25 18:55:08 UTCUser Submission YRP/CRC32_poly_Constant
YRP/CRC32_table YRP/IP [+]
YRP/contentis_base64 YRP/domain YRP/url YRP/flv YRP/excel_XML YRP/gem YRP/pgml
YRP/amf YRP/x3d YRP/_3dxml YRP/DebuggerException__SetConsoleCtrl YRP/anti_dbg
YRP/win_token YRP/win_files_operation YRP/android_meterpreter
YRP/suspicious_packer_section YRP/Microsoft_Visual_Cpp_80
YRP/Microsoft_Visual_Cpp_80_DLL YRP/IsPE64 YRP/IsConsole YRP/IsPacked
YRP/HasOverlay YRP/HasDebugData YRP/HasRichSignature
d05aaf7034ee826ca815228dfa6ece82ba80485a5cae50fc4a95e00a996e1d2b
MS-DOS 2024-05-25 17:45:12 UTCUser Submission CuckooSandbox/vmdetect
YRP/Big_Numbers1 YRP/CRC32_poly_Constant [+]
YRP/SHA512_Constants YRP/contentis_base64 YRP/domain YRP/vmdetect YRP/IsPE64
YRP/IsDLL YRP/IsWindowsGUI YRP/HasDebugData YRP/HasModified_DOS_Message
2e6ef67337ea3fdbe12a24a6e89911a9c033392ce77d69948e49294de2170994
PE32 2024-05-25 17:45:10 UTCUser Submission YRP/contentis_base64 YRP/domain
YRP/Misc_Suspicious_Strings [+]
YRP/DebuggerException__SetConsoleCtrl YRP/win_files_operation
YRP/Borland_Cpp_DLL YRP/Borland_Cpp_for_Win32_1999
YRP/Borland_Cpp_DLL_additional YRP/Borland YRP/IsPE32 YRP/IsConsole
YRP/borland_cpp
ddc39b2a8a8510ffdcc019f77204317e9b706a9f3a6ea4d65fe2066dca8e8277
PE32 2024-05-25 17:45:04 UTCUser Submission YRP/CRC32_poly_Constant
YRP/contentis_base64 YRP/domain [+]
YRP/win_registry YRP/Str_Win32_Winsock2_Library YRP/suspicious_packer_section
YRP/UPX YRP/PackerUPX_CompresorGratuito_wwwupxsourceforgenet
YRP/UPX_wwwupxsourceforgenet_additional
YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h YRP/UPX_290_LZMA
YRP/UPX_290_LZMA_Markus_Oberhumer_Laszlo_Molnar_John_Reiser
YRP/UPX_290_LZMA_additional YRP/UPX_wwwupxsourceforgenet
YRP/UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser YRP/IsPE32 YRP/IsWindowsGUI
YRP/IsPacked YRP/HasOverlay FlorianRoth/DragonFly_APT_Sep17_3
c46527117746e2304fa76b6dd702de117914bdf59e75c688d6af5f1fbcb60081
PE32 2024-05-25 17:45:03 UTCUser Submission YRP/CRC32_poly_Constant
YRP/maldoc_getEIP_method_1 YRP/contentis_base64 [+]
YRP/domain YRP/win_mutex YRP/win_registry YRP/win_files_operation
YRP/Str_Win32_Wininet_Library YRP/suspicious_packer_section YRP/UPX
YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h
YRP/UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser YRP/IsPE32 YRP/IsWindowsGUI
YRP/IsPacked YRP/HasModified_DOS_Message
99abe7535466d300f432dda0cfd7f4adc4e005055dcc28920a87226202d3800d
PE32 2024-05-25 17:44:55 UTCUser Submission YRP/maldoc_getEIP_method_1 YRP/IP
YRP/contentis_base64 [+]
YRP/domain YRP/url YRP/Dropper_Strings YRP/disable_firewall YRP/disable_dep
YRP/network_tcp_socket YRP/network_dns YRP/escalate_priv YRP/win_registry
YRP/win_token YRP/win_files_operation YRP/Str_Win32_Winsock2_Library
YRP/Str_Win32_Wininet_Library YRP/Str_Win32_Internet_API YRP/ASProtect_v132
YRP/IsPE32 YRP/IsWindowsGUI YRP/HasRichSignature YRP/IsSuspicious
23c37f3757fa1084e5938db3d54d6affb8e8ce3b243726c1d239b868b7fad20b
PE32 2024-05-25 17:44:47 UTCUser Submission YRP/maldoc_getEIP_method_1
YRP/contentis_base64 YRP/domain [+]
YRP/DebuggerCheck__QueryInfo YRP/disable_dep YRP/inject_thread
YRP/network_udp_sock YRP/network_tcp_socket YRP/network_dns YRP/escalate_priv
YRP/win_mutex YRP/win_registry YRP/win_token YRP/win_files_operation
YRP/Str_Win32_Winsock2_Library
YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h YRP/IsPE32 YRP/IsDLL
YRP/IsWindowsGUI YRP/IsPacked YRP/HasOverlay YRP/HasRichSignature
504d9f69149a711e93bbe7315a157c8e2fda25332295d7a1b92299c3c62ac702
PE32 2024-05-25 17:44:38 UTCUser Submission YRP/maldoc_getEIP_method_1
YRP/contentis_base64 YRP/domain [+]
YRP/url YRP/win_mutex YRP/win_registry YRP/win_files_operation
YRP/Str_Win32_Wininet_Library
YRP/AHTeam_EP_Protector_03_fake_PCGuard_403_415_FEUERRADER YRP/IsPE32
YRP/IsWindowsGUI YRP/HasOverlay YRP/HasModified_DOS_Message
0f52ca65964e394fb90ce2ecf889aadfad8041e6d8be28e3c383b1cab7b5dbcc
MS-DOS 2024-05-25 17:44:35 UTCUser Submission CuckooSandbox/vmdetect
YRP/Big_Numbers1 YRP/CRC32_poly_Constant [+]
YRP/SHA512_Constants YRP/contentis_base64 YRP/domain YRP/vmdetect YRP/IsPE64
YRP/IsDLL YRP/IsWindowsGUI YRP/HasDebugData YRP/HasModified_DOS_Message

© 2013 - 2024 MalShare | Terms of Service | Sitemap |