MalwareBazaar Database
This page shows some basic information the YARA rule crime_generic_LNK_uid_Jun2021_1 including corresponding malware samples.
Database Entry
| YARA Rule: | crime_generic_LNK_uid_Jun2021_1 |
|---|---|
| Author: | Nils Kuhnert |
| Description: | Triggers on malicious link files which calls powershell with an obfuscated payload and downloads an HTA file. |
| Firstseen: | 2021-06-07 05:37:02 UTC |
| Lastseen: | 2021-06-07 05:37:22 UTC |
| Sightings: | 2 |
Malware Samples
The table below shows all malware samples that matching this particular YARA rule (max 1000).
| Firstseen (UTC) | SHA256 hash | Tags | Signature | Reporter |
|---|