Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
1
2023-07-01 12:23
fb.exe
402c4df156c38ca61ccb6652d33878fb
RedLine stealer
UPX
AntiDebug
AntiVM
.NET EXE
PE File
PE32
Browser Info Stealer
RedLine
Malware download
FTP Client Info Stealer
VirusTotal
Malware
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Collect installed applications
installed browsers check
Stealer
Windows
Browser
ComputerName
DNS
Cryptographic key
Software
crashed
1
Info
×
195.133.147.56 - malware
3
Info
×
ET MALWARE RedLine Stealer TCP CnC net.tcp Init
ET MALWARE Redline Stealer TCP CnC Activity
ET MALWARE Redline Stealer TCP CnC - Id1Response
11.0
M
47
ZeroCERT
2
2023-02-01 18:53
vbc.exe
660e3fcc23c3a833e6e8af22b13ebd81
PWS[m]
RAT
UPX
SMTP
KeyLogger
AntiDebug
AntiVM
PE32
OS Processor Check
.NET EXE
PE File
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
suspicious privilege
Check memory
Checks debugger
unpack itself
Windows
Browser
Email
ComputerName
DNS
Cryptographic key
Software
crashed
1
Info
×
45.137.65.132
6.4
M
39
ZeroCERT
3
2022-08-16 10:27
2.exe
897741707d0f48e3fc4a504689b52c46
PWS[m]
RAT
UPX
SMTP
KeyLogger
AntiDebug
AntiVM
PE32
PE File
.NET EXE
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Check virtual network interfaces
Tofsee
Windows
Browser
Email
ComputerName
Cryptographic key
Software
crashed
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
4
Info
×
apps.identrust.com(119.207.65.137)
mail.obrascsm.com(91.134.184.195)
91.134.184.195
182.162.106.33 - malware
2
Info
×
SURICATA Applayer Detect protocol only one direction
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
12.2
M
31
ZeroCERT
4
2022-08-16 10:27
1.exe
fbde807c77c8a702774129ac160bb75b
PWS[m]
RAT
UPX
SMTP
KeyLogger
AntiDebug
AntiVM
PE32
PE File
.NET EXE
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Check virtual network interfaces
Tofsee
Windows
Browser
Email
ComputerName
Remote Code Execution
Cryptographic key
Software
crashed
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
4
Info
×
apps.identrust.com(119.207.65.153)
mail.obrascsm.com(91.134.184.195)
91.134.184.195
23.216.159.9
2
Info
×
SURICATA Applayer Detect protocol only one direction
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
12.4
M
32
ZeroCERT
5
2022-08-16 09:29
1.exe
fbde807c77c8a702774129ac160bb75b
RAT
UPX
PE32
PE File
.NET EXE
VirusTotal
Malware
Remote Code Execution
1.6
M
32
ZeroCERT
6
2022-08-16 09:28
2.exe
897741707d0f48e3fc4a504689b52c46
RAT
UPX
PE32
PE File
.NET EXE
VirusTotal
Malware
1.4
M
31
ZeroCERT
First
1
Last
Total : 6cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword