Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
1
2021-07-23 09:45
okilo.exe
e85a0e1e81acbcea6a0e10eeedf32f6d
PWS
.NET framework
RAT
Generic Malware
Admin Tool (Sysinternals etc ...)
SMTP
KeyLogger
AntiDebug
AntiVM
PE32
.NET EXE
PE File
VirusTotal
Malware
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows utilities
suspicious process
WriteConsoleW
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Info
×
88.99.99.222 - malware
12.8
M
25
ZeroCERT
2
2021-07-14 09:41
wininit.exe
7b68b43f14bff45ad706488b5b3e8414
PWS
Loki[b]
Loki[m]
.NET framework
Generic Malware
UPX
Admin Tool (Sysinternals etc ...)
DNS
Socket
AntiDebug
AntiVM
PE32
PE File
.NET EXE
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
suspicious privilege
MachineGuid
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
malicious URLs
AntiVM_Disk
VM Disk Size Check
installed browsers check
Windows
Browser
Email
ComputerName
DNS
Cryptographic key
Software
crashed
1
Keyword trend analysis
×
Info
×
http://185.227.139.18/dsaicosaicasdi.php/S4wFP8QBww9Tp - rule_id: 2584
1
Info
×
185.227.139.18 - mailcious
1
Info
×
http://185.227.139.18/dsaicosaicasdi.php
14.8
M
36
ZeroCERT
3
2021-07-14 09:07
man.exe
de71ac4aaadb83cd7d93bd45e3f269aa
PWS
.NET framework
Generic Malware
UPX
Admin Tool (Sysinternals etc ...)
PE32
PE File
.NET EXE
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
DNS
crashed
1
Info
×
185.56.76.28 - mailcious
2.8
26
ZeroCERT
4
2021-05-25 10:01
94tjF7QB1LlfpIm.exe
e7b6e0339e511aef97733309f4fc7c62
PWS
.NET framework
Malicious Library
.NET EXE
PE File
PE32
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Windows
Cryptographic key
2.2
M
25
ZeroCERT
5
2021-05-25 09:33
tSuk40mH9f7Dz23.exe
232b3e7b065156daaabbc65228e0eede
AsyncRAT
backdoor
PWS
.NET framework
Malicious Library
.NET EXE
PE File
PE32
VirusTotal
Malware
PDB
Check memory
Checks debugger
unpack itself
Windows
Cryptographic key
2.4
21
ZeroCERT
6
2021-05-13 08:23
kn.exe
167f0a829df709cc4107369ed23fbdfb
Malicious Library
DNS
AntiDebug
AntiVM
.NET EXE
PE File
PE32
VirusTotal
Malware
Buffer PE
PDB
suspicious privilege
MachineGuid
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Windows utilities
suspicious process
WriteConsoleW
human activity check
Tofsee
Windows
ComputerName
DNS
DDNS
2
Keyword trend analysis
×
Info
×
http://edgedl.me.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
https://update.googleapis.com/service/update2?cup2key=10:554636579&cup2hreq=f1e8358d230c769ebdd30f8b65f8e5e943940b09e34e48f61ef8e622dae553a6
5
Info
×
edgedl.me.gvt1.com(34.104.35.123)
wespeaktruthtoman.sytes.net(79.134.225.47) - mailcious
79.134.225.47 - mailcious
34.104.35.123
142.250.204.99
4
Info
×
ET POLICY PE EXE or DLL Windows file download HTTP
ET INFO EXE - Served Attached HTTP
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
16.6
31
ZeroCERT
7
2021-04-19 21:59
vbc.exe
f17d8c94783597296264ab489cfc64b8
VirusTotal
Malware
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
ComputerName
Cryptographic key
crashed
8.8
M
17
ZeroCERT
8
2021-04-08 18:08
xxxlss-01.exe
077e3ce60c1e587de33f62a1b6abcc19
Azorult
.NET framework
VirusTotal
Malware
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
DNS
Cryptographic key
8.6
M
30
ZeroCERT
First
1
Last
Total : 8cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword