MalwareBazaar Database
This page shows some basic information the YARA rule abused_screenconnect_config including corresponding malware samples.
Database Entry
| YARA Rule: | abused_screenconnect_config |
|---|---|
| Author: | Ariel Davidpur (arield9) |
| Description: | Detect ScreenConnect EXEs with suspicious host in ?h= parameter |
| Firstseen: | 2025-05-07 10:13:05 UTC |
| Lastseen: | 2025-10-12 21:33:17 UTC |
| Sightings: | 70 |
Malware Samples
The table below shows all malware samples that matching this particular YARA rule (max 1000).
| Firstseen (UTC) | SHA256 hash | Tags | Signature | Reporter |
|---|