Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
1
2023-08-07 09:14
Xmqgijbudgv.exe
c5b41042c6a47872025836fcce77e1bc
UPX
.NET framework(MSIL)
.NET EXE
PE File
PE32
VirusTotal
Malware
Buffer PE
AutoRuns
suspicious privilege
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
Cryptographic key
4.6
M
42
ZeroCERT
2
2022-11-23 20:21
vbc.exe
a9f72304e7fb7043e916fd2aa9634e34
AgentTesla
PWS[m]
RAT
browser
info stealer
Generic Malware
Google
Chrome
User Data
Downloader
Antivirus
ScreenShot
Create Service
Socket
DNS
Internet API
Sniff Audio
KeyLogger
Escalate priviledges
AntiDebug
AntiVM
PE32
.NET EXE
PE File
Browser Info Stealer
Remcos
VirusTotal
Email Client Info Stealer
Malware
powershell
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
Creates shortcut
unpack itself
powershell.exe wrote
suspicious process
AntiVM_Disk
sandbox evasion
VM Disk Size Check
installed browsers check
Windows
Browser
Email
ComputerName
DNS
Cryptographic key
DDNS
crashed
keylogger
1
Keyword trend analysis
×
Info
×
http://geoplugin.net/json.gp
4
Info
×
geoplugin.net(178.237.33.50)
aryexpcrt.ddns.net(68.235.48.108) - mailcious
178.237.33.50
68.235.48.108 - mailcious
2
Info
×
ET JA3 Hash - Remcos 3.x TLS Connection
ET POLICY DNS Query to DynDNS Domain *.ddns .net
15.8
M
24
ZeroCERT
3
2022-09-23 17:43
aaa.exe
7b74e4fb9a95f41d5d9b4a71a5fe40b9
Gen2
Gen1
Malicious Library
UPX
Malicious Packer
PE32
PE File
DLL
VirusTotal
Malware
Buffer PE
Check memory
buffers extracted
Creates executable files
unpack itself
AppData folder
crashed
4.4
M
30
ZeroCERT
4
2022-09-23 17:37
aaa.exe
7b74e4fb9a95f41d5d9b4a71a5fe40b9
Gen2
Gen1
Malicious Library
UPX
Malicious Packer
PE32
PE File
DLL
VirusTotal
Malware
Buffer PE
Check memory
buffers extracted
Creates executable files
unpack itself
AppData folder
crashed
4.4
M
30
ZeroCERT
5
2022-01-17 13:34
AdobeUpdate.exe
aee35c2dc70abe1732fc4fc593aa6e37
Gen2
Generic Malware
Malicious Library
UPX
PE64
PE File
OS Processor Check
VirusTotal
Malware
Creates executable files
Remote Code Execution
1.8
9
ZeroCERT
6
2021-10-15 10:10
@haiz_install.exe
7ae610290258f93dead5795ad70c793d
RAT
Generic Malware
UPX
AntiDebug
AntiVM
PE File
PE32
.NET EXE
Browser Info Stealer
VirusTotal
Malware
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
WMI
ICMP traffic
unpack itself
Collect installed applications
Check virtual network interfaces
suspicious TLD
installed browsers check
Windows
Browser
ComputerName
DNS
Cryptographic key
crashed
2
Keyword trend analysis
×
Info
×
http://ne.komaiasowu.ru/
http://65.21.105.85/barell.exe
4
Info
×
ne.komaiasowu.ru(81.177.141.85)
81.177.141.85 - mailcious
65.21.105.85 - malware
5.61.61.168
1
Info
×
ET INFO Executable Download from dotted-quad Host
14.0
M
35
ZeroCERT
First
1
Last
Total : 6cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword