Threat Feed
https://tryjhytyjctfhdrxtse46ysxfgjxfyjfyjxdthtrterrthfhhhfff.weebly.com
2026-05-20T03:44:54.401
malicious
URL
Phishing
http://49.51.43.12/v3/signin/identifier?amp%3Bfollowup=https%3A%2F%2Faccounts.google.com%2F&amp%3Bifkv=AQMjQ7QyROPzn0qaqnYvX4_aw7qH8RajahyDV4UI8mo2Mw7SaNi-z6QQG4MH4pDlzJ2gDPTt_nm2&amp%3Bpassive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&flowName=GlifWebSignIn&flowEntry=ServiceLogin&ifkv=AWa2PavvR6zlQMgkcWL8eqJOHkHUY3s8ArRidLhHXTCi1eJHWErD0lErO9_vb9tNk2ukoGhuxz6stA&dsh=S-532950407%3A1779245769693903
2026-05-20T03:38:46.175
malicious
URL
Phishing
CvyjNyIu5ZSA1lCy.exe
2026-05-20T03:25:00.362
malicious
Windows Exe (x86-32)
Backdoor
HDwjwkV18RyWjKNy.exe
2026-05-20T03:21:06.241
malicious
Windows Exe (x86-32)
Backdoor
PO#. 0764PTTHI15.05.2026.pdf.js
2026-05-20T03:16:32.313
malicious
JScript
Spyware
Backdoor
Downloader
Injector
On a daily basis the VMRay Labs Team collects a selected group of publicly available malware samples and runs them in our best-of-breed malware sandbox, VMRay Analyzer.