ThreatFeed
Technology
VMRay DeepResponse
Resources
Try VMRay
Threat Feed
Filter by Classification
Adware
Backdoor
Banker
Banking Trojan
Bot
Crypter
Crypter
Dialer
Downloader
Dropper
Eicar
EICAR
Exploit
Hacktool
HackTool
Injector
Jigsaw
Keylogger
Miner
Phishing
POS
Pua
PUA
Ransomware
RAT
Remote Access Trojan
Rootkit
Skylock
Spyware
Stealer
Trojan
Virus
Wiper
Worm
Xorist
Filter by Sample Type
Excel Document
HTML Application
HTML Application (Shell Link)
HTML Document
Java Archive
Java Class
JScript
Linux ELF Executable (x86-64)
macOS App
macOS Executable
Microsoft Access Database
Microsoft Publisher Document
MSI Setup
PDF Document
Powerpoint Document
PowerShell Script
PowerShell Script (Shell Link)
Python Script
RTF Document
Shell Script
URL
VBScript
Windows ActiveX Control (x86-32)
Windows ActiveX Control (x86-64)
Windows Batch File
Windows Batch File (Shell Link)
Windows DLL (x86-32)
Windows DLL (x86-64)
Windows Driver (x86-32)
Windows Driver (x86-64)
Windows Exe (x86-32)
Windows Exe (x86-64)
Windows Help File
Windows Script File
Word Document
Search
1
2
506546
>
https://microsoftxnxnxn.framer.wiki
2026-02-09T20:57:55.869
malicious
URL
Details
Close
https://microsoftxnxnxn.framer.wiki
malicious
SHA256:
VMRay Threat Identifiers
Severity
Operation
5/5
Combination of other detections indicates a phishing website
4/5
Phishing page detected via Machine Learning
2/5
Page title matches the name of a popular online service
2/5
Branded Logon form detected via Computer Vision
1/5
Page secured via a Domain Validated SSL certificate
1/5
Branding image detected via Computer Vision
1/5
Page presents itself as a logon page
1/5
Logon form detected via Computer Vision
Full Report
Close
Phishing
Full Report
https://gmx-email-alert.weebly.com
2026-02-09T20:54:20.821
malicious
URL
Details
Close
https://gmx-email-alert.weebly.com
malicious
SHA256:
VMRay Threat Identifiers
Severity
Operation
5/5
Combination of other detections indicates a phishing website
4/5
Phishing page detected via Machine Learning
2/5
Page is served from a service commonly used for temporary hosting
2/5
Page title matches the name of a popular online service
1/5
Page secured via a Domain Validated SSL certificate
1/5
Logon form detected via Computer Vision
1/5
Resource is loaded from a service commonly used for temporary hosting
1/5
Content matched by YARA rules
Full Report
Close
Phishing
Full Report
https://rental-manager.weebly.com
2026-02-09T20:53:13.302
malicious
URL
Details
Close
https://rental-manager.weebly.com
malicious
SHA256:
VMRay Threat Identifiers
Severity
Operation
5/5
Malicious content matched by YARA rules
2/5
Page is served from a service commonly used for temporary hosting
1/5
Logon form detected via Computer Vision
1/5
Resource is loaded from a service commonly used for temporary hosting
1/5
Page presents itself as a logon page
1/5
Content matched by YARA rules
Full Report
Close
Phishing
Full Report
https://magnificent-reflect-934880.framer.app
2026-02-09T20:51:17.151
malicious
URL
Details
Close
https://magnificent-reflect-934880.framer.app
malicious
SHA256:
VMRay Threat Identifiers
Severity
Operation
5/5
Combination of other detections indicates a phishing website
4/5
Phishing page detected via Machine Learning
3/5
Page contains a Microsoft logon form
1/5
Logon form detected via Computer Vision
1/5
Page secured via a Domain Validated SSL certificate
1/5
Page presents itself as a logon page
1/5
Branding image detected via Computer Vision
Full Report
Close
Phishing
Full Report
https://cuddly-value-106815.framer.app
2026-02-09T20:50:22.633
malicious
URL
Details
Close
https://cuddly-value-106815.framer.app
malicious
SHA256:
VMRay Threat Identifiers
Severity
Operation
5/5
Combination of other detections indicates a phishing website
4/5
Phishing page detected via Machine Learning
3/5
Page contains a Microsoft logon form
2/5
Page uses exact same title as that of a popular online service
2/5
Branded Logon form detected via Computer Vision
1/5
Page secured via a Domain Validated SSL certificate
1/5
Branding image detected via Computer Vision
1/5
Page presents itself as a logon page
1/5
Logon form detected via Computer Vision
Full Report
Close
Phishing
Full Report
1
2
506546
>