Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
1
2023-09-19 11:21
Betro.exe
1c9f3c0258e923c07e1943498c789a3d
Downloader
Create Service
Socket
DGA
Escalate priviledges
PWS
Sniff Audio
SMTP
DNS
ScreenShot
Code injection
Internet API
KeyLogger
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows utilities
suspicious process
malicious URLs
Ransomware
BitRAT
Windows
ComputerName
DNS
Cryptographic key
keylogger
1
Info
×
185.225.75.68 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (BitRAT)
13.6
M
37
r0d
2
2023-09-19 11:14
Betro.exe
1c9f3c0258e923c07e1943498c789a3d
Downloader
Create Service
Socket
DGA
Escalate priviledges
PWS
Sniff Audio
SMTP
DNS
ScreenShot
Code injection
Internet API
KeyLogger
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows utilities
suspicious process
malicious URLs
Ransomware
BitRAT
Windows
ComputerName
DNS
Cryptographic key
keylogger
1
Info
×
185.225.75.68 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (BitRAT)
13.6
M
37
r0d
3
2023-09-19 11:06
Betro.exe
1c9f3c0258e923c07e1943498c789a3d
Downloader
Create Service
Socket
DGA
Escalate priviledges
PWS
Sniff Audio
SMTP
DNS
ScreenShot
Code injection
Internet API
KeyLogger
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows utilities
suspicious process
malicious URLs
Ransomware
BitRAT
Windows
ComputerName
DNS
Cryptographic key
keylogger
1
Info
×
185.225.75.68 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (BitRAT)
13.6
M
37
r0d
4
2023-09-19 07:38
Betro.exe
1c9f3c0258e923c07e1943498c789a3d
Gen1
Downloader
UPX
Malicious Packer
Malicious Library
Create Service
Socket
DGA
Escalate priviledges
PWS
Sniff Audio
SMTP
DNS
ScreenShot
Code injection
Internet API
KeyLogger
AntiDebug
AntiVM
PE File
PE32
.NET EXE
DLL
OS Processor Check
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
Buffer PE
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
Creates executable files
unpack itself
Windows utilities
suspicious process
AppData folder
malicious URLs
WriteConsoleW
Ransomware
BitRAT
Windows
Browser
Email
ComputerName
DNS
Cryptographic key
Software
keylogger
Password
3
Info
×
www.xenarmor.com(69.64.94.128) - mailcious
185.225.75.68
69.64.94.128 - mailcious
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (BitRAT)
ET POLICY XenArmor Password Recovery License Check
20.8
M
29
ZeroCERT
5
2022-12-02 10:47
mhlewy.exe
7e319c1315d5b97983fb7cb4d93ddf0c
RAT
Generic Malware
Antivirus
PE32
.NET EXE
PE File
VirusTotal
Malware
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
Check virtual network interfaces
suspicious process
Tofsee
Windows
ComputerName
DNS
Cryptographic key
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
5
Info
×
apps.identrust.com(23.43.165.105)
a.pomf.cat(69.39.225.3) - mailcious
61.111.58.34 - malware
69.39.225.3 - malware
45.33.6.223
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
6.8
M
31
ZeroCERT
6
2022-11-25 11:20
grbgyk.exe
3f6cd0ff8f90ba35fe22b94e55655c96
RAT
PE32
.NET EXE
PE File
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
Tofsee
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
4
Info
×
apps.identrust.com(23.43.165.66)
a.pomf.cat(69.39.225.3) - mailcious
69.39.225.3 - malware
121.254.136.27
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
2.8
M
29
ZeroCERT
7
2022-11-22 10:17
walpll.exe
d43ca72d6fd0c9a2e3f3774b74fd5028
RAT
PE32
.NET EXE
PE File
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
Tofsee
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
4
Info
×
apps.identrust.com(23.216.159.81)
a.pomf.cat(69.39.225.3) - mailcious
61.111.58.34 - malware
69.39.225.3 - malware
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
3.4
M
21
ZeroCERT
8
2022-03-19 11:41
Dykmb.exe
e3b337f03751264666ae823d6768a3b7
Hide_EXE
task schedule
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
suspicious process
WriteConsoleW
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Info
×
212.193.30.54 - mailcious
12.2
M
28
ZeroCERT
9
2022-03-16 13:59
Fkmpd.exe
f0fc87cd7409e7f3a58c2a76244b7dc3
PWS
.NET framework
Hide_EXE
task schedule
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
suspicious process
WriteConsoleW
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Info
×
212.193.30.54 - mailcious
12.2
M
39
ZeroCERT
10
2022-03-15 09:41
Gtpkm.exe
e0ff85b978c48f247b89eed15d8b0eea
Hide_EXE
task schedule
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
suspicious process
WriteConsoleW
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Info
×
212.193.30.54 - mailcious
12.2
34
ZeroCERT
11
2022-03-12 22:57
Cyup.exe
723e85e9cd88b3ddaa1b44346ceeaf7d
Hide_EXE
task schedule
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Info
×
212.193.30.54 - mailcious
12.2
M
27
ZeroCERT
12
2022-03-10 15:14
Droj.exe
6244bdface5bf2ec0ab400f9db947965
PWS
.NET framework
Hide_EXE
task schedule
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Info
×
212.193.30.54 - mailcious
11.4
M
39
ZeroCERT
13
2022-03-05 21:22
Grodo.exe
9f18eca7a171f9632ac463d09d6e8dce
Hide_EXE
task schedule
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
suspicious process
WriteConsoleW
Windows
ComputerName
Cryptographic key
crashed
10.4
M
43
ZeroCERT
14
2022-03-05 21:20
Dmup.exe
3812edfc14784ce52c995881e974353d
Hide_EXE
task schedule
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
suspicious process
WriteConsoleW
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Info
×
212.193.30.54 - mailcious
12.6
M
39
ZeroCERT
15
2022-03-04 09:53
Frodo.exe
8be2796c69d85aadf258ce9497179c5b
Hide_EXE
Generic Malware
task schedule
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
suspicious process
WriteConsoleW
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Info
×
198.251.89.144 - phishing
11.8
M
33
ZeroCERT
First
1
2
Last
Total : 21cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword