Threat Feed
http://49.51.43.12/v3/signin/identifier?flowName=GlifWebSignIn&flowEntry=ServiceLogin&ifkv=ASfE1-okzdmxDgwl72FLv6DvSqzmWuGHvB3o1PMXbsLup74OdMQEnjwRdnOBMMhq082Pd9EtE2_GlQ&dsh=S1831767208%3A1771529672892923
2026-02-19T20:56:31.678
malicious
URL
Phishing
nota_svignoli@freemail.com.br.lnk
2026-02-19T20:53:37.718
malicious
Windows Batch File (Shell Link)
Backdoor
http://49.51.43.12/v3/signin/identifier?amp%3Bfollowup=https%3A%2F%2Faccounts.google.com%2F&amp%3Bifkv=AQMjQ7QyROPzn0qaqnYvX4_aw7qH8RajahyDV4UI8mo2Mw7SaNi-z6QQG4MH4pDlzJ2gDPTt_nm2&amp%3Bpassive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&flowName=GlifWebSignIn&flowEntry=ServiceLogin&ifkv=ASfE1-o3JiZQRsL91ZUHVA719NziUO6oA-j352na8JoNYVCVBW9-Ebr73ypEbTHAckAXFKCU1aQbng&dsh=S1060564159%3A1771530772491464
2026-02-19T20:45:59.825
malicious
URL
Phishing
5zek3MXkUCOcRfPB.exe
2026-02-19T20:33:46.123
malicious
Windows Exe (x86-32)
Spyware
Backdoor
8cQKwn72E4JXsNYX.exe
2026-02-19T20:33:42.769
malicious
Windows Exe (x86-64)
Injector
On a daily basis the VMRay Labs Team collects a selected group of publicly available malware samples and runs them in our best-of-breed malware sandbox, VMRay Analyzer.