Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
1
2021-11-09 09:55
vbc.exe
0dabcdb8e3d8768527502f784841c91f
RAT
PWS
.NET framework
Generic Malware
Admin Tool (Sysinternals etc ...)
PE File
PE32
.NET EXE
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
Tofsee
crashed
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
4
Info
×
textbin.net(51.79.99.124)
apps.identrust.com(119.207.65.81)
121.254.136.27
51.79.99.124
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
2.8
37
ZeroCERT
2
2021-10-07 11:02
vbc.exe
da19a523623dccfc4592bdc4c774e914
RAT
Generic Malware
Admin Tool (Sysinternals etc ...)
PE File
PE32
.NET EXE
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
Tofsee
crashed
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
4
Info
×
textbin.net(51.79.99.124)
apps.identrust.com(52.216.110.82)
54.231.120.209
51.79.99.124
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
2.8
M
38
ZeroCERT
3
2021-09-28 13:50
vbc.exe
ee08c2b0eb157fba44b97e80d69d498b
RAT
PWS
.NET framework
Generic Malware
Admin Tool (Sysinternals etc ...)
SMTP
KeyLogger
AntiDebug
AntiVM
PE File
.NET EXE
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Check virtual network interfaces
Tofsee
Windows
Browser
Email
ComputerName
Cryptographic key
Software
crashed
1
Keyword trend analysis
×
Info
×
https://pastebin.pl/view/raw/ae498e11 - rule_id: 4631
2
Info
×
pastebin.pl(168.119.93.163) - mailcious
168.119.93.163 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
1
Info
×
https://pastebin.pl/view/raw/ae498e11
12.2
M
32
ZeroCERT
4
2021-09-23 08:47
vbc.exe
c5b8eff1e9f73c6c365876188326f2e4
RAT
PWS
.NET framework
Generic Malware
UPX
Admin Tool (Sysinternals etc ...)
SMTP
KeyLogger
AntiDebug
AntiVM
PE File
.NET EXE
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Check virtual network interfaces
Tofsee
Windows
Browser
Email
ComputerName
Cryptographic key
Software
crashed
1
Keyword trend analysis
×
Info
×
https://pastebin.pl/view/raw/ae498e11 - rule_id: 4631
2
Info
×
pastebin.pl(168.119.93.163) - mailcious
168.119.93.163 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
1
Info
×
https://pastebin.pl/view/raw/ae498e11
12.0
M
20
ZeroCERT
5
2021-08-19 19:11
vbc.exe
843aed3eb5b9f0cd4696da19242924c1
RAT
PWS
.NET framework
Generic Malware
Admin Tool (Sysinternals etc ...)
SMTP
KeyLogger
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Check virtual network interfaces
Tofsee
Windows
ComputerName
Cryptographic key
crashed
1
Keyword trend analysis
×
Info
×
https://pastebin.pl/view/raw/2281be39 - rule_id: 4251
2
Info
×
pastebin.pl(168.119.93.163) - mailcious
168.119.93.163 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
1
Info
×
https://pastebin.pl/view/raw/2281be39
10.4
M
22
ZeroCERT
First
1
Last
Total : 5cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword