Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
1
2021-08-10 09:37
wechat-35355.exe
e988d1994581870c6aac979f87ab2a5c
NPKI
PWS
Loki[b]
Loki[m]
Gen2
Gen1
Generic Malware
Malicious Library
UPX
Antivirus
Malicious Packer
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal
Browser Info Stealer
VirusTotal
Malware
powershell
Buffer PE
AutoRuns
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
WMI
Creates shortcut
Creates executable files
unpack itself
Windows utilities
powershell.exe wrote
Check virtual network interfaces
suspicious process
AppData folder
malicious URLs
AntiVM_Disk
sandbox evasion
WriteConsoleW
Firewall state off
VM Disk Size Check
installed browsers check
Tofsee
Windows
Browser
ComputerName
Remote Code Execution
Cryptographic key
crashed
6
Info
×
raw.githubusercontent.com(185.199.111.133) - malware
tBfNnomHZaZYlUMCzNsz.tBfNnomHZaZYlUMCzNsz()
22231jssdszs.fun()
rbThmErFPsQOqBITcVsiJBDzE.rbThmErFPsQOqBITcVsiJBDzE()
dvYQmQzOWlOLeZxphJ.dvYQmQzOWlOLeZxphJ()
185.199.110.133 - malware
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
17.0
12
ZeroCERT
First
1
Last
Total : 1cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword