Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
1
2022-12-12 11:23
TeamViewerSetupx64.exe
852011cf885e76c0441dd52fdd280db7
Gen2
Malicious Library
Malicious Packer
UPX
Antivirus
OS Processor Check
PE File
PE64
VirusTotal
Malware
PDB
MachineGuid
3.2
M
21
ZeroCERT
2
2022-12-12 11:23
TeamViewer_Desktop.exe
0c9df67f152a727b0832aa4e7f079a71
ASPack
UPX
PE32
PE File
Malware download
VirusTotal
Malware
AutoRuns
Check memory
Windows utilities
WriteConsoleW
Windows
ComputerName
DNS
1
Info
×
45.89.255.250 - malware
1
Info
×
ET MALWARE Win32/Nitol.A Checkin
4.4
M
43
ZeroCERT
3
2022-11-28 10:38
Emiditor.exe
e08805d6085d6402dcaeb253e4375a09
RAT
Generic Malware
UPX
OS Processor Check
PE File
PE64
VirusTotal
Malware
unpack itself
Windows
crashed
3.6
M
47
ZeroCERT
4
2022-11-02 11:25
Emit.exe
c8f867aac14b76cca1b1c16e592b7057
RAT
UPX
PE File
PE64
VirusTotal
Malware
Malicious Traffic
Check memory
Checks debugger
RWX flags setting
unpack itself
Check virtual network interfaces
DNS
1
Keyword trend analysis
×
Info
×
http://5.206.227.167/Xysltf.png
1
Info
×
5.206.227.167 - malware
4.0
M
8
ZeroCERT
5
2022-10-29 14:45
avicap32.exe
74427a823d84a977bb2be67280a09c01
RAT
PWS
.NET framework
Admin Tool (Sysinternals etc ...)
UPX
PE32
.NET EXE
PE File
VirusTotal
Malware
Check memory
Checks debugger
RWX flags setting
unpack itself
2.8
M
33
ZeroCERT
6
2022-07-28 09:52
vbc.exe
d0efe01f8cfc6414df7959774ec7bf2a
RAT
PE32
.NET EXE
PE File
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
Tofsee
2
Info
×
textbin.net(148.72.177.212) - mailcious
148.72.177.212 - mailcious
2
Info
×
ET INFO TLS Handshake Failure
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
2.2
M
32
ZeroCERT
7
2022-01-20 18:38
BBVVCCVVB.exe
9f25378bad3a8189597a5f9d420ef70f
RAT
Generic Malware
UPX
PE64
PE File
VirusTotal
Malware
PDB
MachineGuid
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
4
Info
×
apps.identrust.com(119.207.65.137)
transfer.sh(144.76.136.153) - malware
121.254.136.27
144.76.136.153 - mailcious
3.2
M
23
ZeroCERT
8
2022-01-20 18:36
xloader_ramos.exe
5cda0b468d4136fb19e1f79c258acbb9
RAT
Generic Malware
UPX
PE64
PE File
VirusTotal
Malware
PDB
MachineGuid
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
4
Info
×
apps.identrust.com(119.207.65.153)
transfer.sh(144.76.136.153) - malware
144.76.136.153 - mailcious
121.254.136.57
3.0
M
13
ZeroCERT
9
2021-12-24 12:51
JOKS.scr
a19a91e08fe068a3fa39668805da6cdb
PWS
.NET framework
NPKI
email
stealer
Hide_EXE
Generic Malware
UPX
ASPack
Malicious Packer
Malicious Library
Antivirus
DNS
Code injection
KeyLogger
Escalate priviledges
Downloader
persistence
AntiDebug
AntiVM
PE File
PE32
.NET EXE
Browser Info Stealer
Malware download
VirusTotal
Email Client Info Stealer
Malware
powershell
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
WMI
Creates shortcut
Creates executable files
unpack itself
Windows utilities
powershell.exe wrote
suspicious process
AppData folder
AntiVM_Disk
sandbox evasion
WriteConsoleW
VM Disk Size Check
installed browsers check
Windows
Browser
Email
ComputerName
DNS
Cryptographic key
DDNS
crashed
1
Keyword trend analysis
×
Info
×
http://hata.co.za/iuy/join.pif
5
Info
×
jerenyankipong.duckdns.org(129.232.18.35) - mailcious
hata.co.za(154.0.162.214) - malware
208.95.112.1
129.232.18.35
154.0.162.214 - malware
3
Info
×
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
ET POLICY PE EXE or DLL Windows file download HTTP
ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2
16.0
17
ZeroCERT
10
2021-12-24 12:50
join.pif
026c6ed9154e7cfa7329ef6d006f162a
PWS
Loki[b]
Loki.m
.NET framework
Hide_EXE
Generic Malware
task schedule
UPX
ASPack
Malicious Packer
Malicious Library
Antivirus
DNS
KeyLogger
ScreenShot
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
powershell
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
Creates shortcut
Creates executable files
unpack itself
Windows utilities
powershell.exe wrote
suspicious process
AppData folder
sandbox evasion
WriteConsoleW
IP Check
Windows
ComputerName
DNS
Cryptographic key
DDNS
crashed
1
Keyword trend analysis
×
Info
×
http://ip-api.com/json/
4
Info
×
jerenyankipong.duckdns.org(129.232.18.35) - mailcious
ip-api.com(208.95.112.1)
129.232.18.35
208.95.112.1
2
Info
×
ET POLICY External IP Lookup ip-api.com
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
13.6
17
ZeroCERT
11
2021-08-17 13:36
vbc.exe
8396573aa3039b144f584107f785b321
RAT
Generic Malware
Admin Tool (Sysinternals etc ...)
PE File
.NET EXE
PE32
VirusTotal
Malware
PDB
Check memory
Checks debugger
unpack itself
DNS
3
Info
×
105.27.205.34 - mailcious
60.51.47.65 - mailcious
36.66.188.251
3.0
M
30
ZeroCERT
First
1
Last
Total : 11cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword