Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
15031
2023-03-08 17:37
starm.exe
3164bd50674c7af7f793631116a76e11
PWS
.NET framework
RAT
UPX
OS Processor Check
.NET EXE
PE32
PE File
VirusTotal
Malware
PDB
Malicious Traffic
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
Tofsee
Windows
1
Keyword trend analysis
×
Info
×
http://vulcano-group.com/west/Beiggc.bmp
2
Info
×
vulcano-group.com(23.111.184.154) - mailcious
23.111.184.154 - mailcious
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET HUNTING Suspicious Terse Request for .bmp
4.2
24
ZeroCERT
15032
2023-03-08 17:35
g8ci.exe
fcf17bb869c527c83eba15db716797a8
PWS
.NET framework
RAT
UPX
OS Processor Check
.NET EXE
PE32
PE File
VirusTotal
Malware
PDB
Malicious Traffic
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
Tofsee
Windows
1
Keyword trend analysis
×
Info
×
http://vulcano-group.com/west/Jsinowdw.dat
2
Info
×
vulcano-group.com(23.111.184.154) - mailcious
23.111.184.154 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
3.8
3
ZeroCERT
15033
2023-03-08 17:34
unknown.exe
f35d0d1430dcc7122751a2985e0cdfdb
PWS
.NET framework
RAT
UPX
Malicious Library
Antivirus
OS Processor Check
.NET EXE
PE32
PE File
suspicious privilege
MachineGuid
Check memory
Checks debugger
unpack itself
AntiVM_Disk
VM Disk Size Check
Windows
ComputerName
keylogger
3.2
ZeroCERT
15034
2023-03-08 17:33
73cceb_69fbb28af79141d4b6bec17...
54846ba2f55540444b2f62d30ef9cdbc
Hide_EXE
PowerShell
Script
MZ
Generic Malware
Anti_VM
Antivirus
VirusTotal
Malware
powershell
AutoRuns
Check memory
Creates executable files
unpack itself
Windows utilities
powershell.exe wrote
suspicious process
WriteConsoleW
Windows
ComputerName
Cryptographic key
1
Keyword trend analysis
×
Info
×
https://backuphotelall.blogspot.com/atom.xml
4.6
M
4
ZeroCERT
15035
2023-03-08 17:30
ChatGPT.exe
cd12cb026f70700b6d7d3122360c52e8
Generic Malware
UPX
Malicious Library
Malicious Packer
OS Processor Check
PE File
PE64
VirusTotal
Malware
0.6
M
11
ZeroCERT
15036
2023-03-08 17:27
Disposizioni.url
6bbce3224d51716918724a26773d1568
AntiDebug
AntiVM
MSOffice File
VirusTotal
Malware
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
1
Keyword trend analysis
×
Info
×
http://46.8.19.32/mise/server.exe
1
Info
×
46.8.19.32 - mailcious
2
Info
×
ET INFO TLS Handshake Failure
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
5.8
7
ZeroCERT
15037
2023-03-08 17:26
cliente.url
361301f6ad56d5f44ed70afcbf223df0
AntiDebug
AntiVM
MSOffice File
VirusTotal
Malware
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
1
Keyword trend analysis
×
Info
×
http://46.8.210.31/Agenzia/server.exe
1
Info
×
46.8.210.31
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
5.8
3
ZeroCERT
15038
2023-03-08 15:12
.com.apple.containermanagerd.m...
3fba7ecce37ca2ef279bb940a79db072
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
BRY
15039
2023-03-08 14:03
Documento.xls
893f9b10a48073fc3fa0d5c8867f7200
Downloader
MSOffice File
VirusTotal
Malware
ICMP traffic
RWX flags setting
unpack itself
suspicious process
Tofsee
1
Keyword trend analysis
×
Info
×
http://apps.identrust.com/roots/dstrootcax3.p7c
9
Info
×
cs.com.sg(103.237.169.99) - malware
apps.identrust.com(96.16.99.43)
atici.net() - malware
clanbaker.org(208.87.225.118) - malware
j2ccamionmagasin.fr(152.228.216.255) - malware
103.237.169.99 - malware
208.87.225.118 - malware
152.228.216.255
121.254.136.27
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
M
43
ZeroCERT
15040
2023-03-08 14:01
pzOEfyaZPW1OyO690Z19HEU7.dll
fe1097b9754d8e3c54c7f54c68c4dabd
Malicious Library
Malicious Packer
DLL
PE File
PE64
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
suspicious process
sandbox evasion
Remote Code Execution
4.2
22
ZeroCERT
15041
2023-03-08 14:01
X8099607585O.xls
6493581b246b731e4937fbee64a68803
Downloader
ScreenShot
PWS[m]
KeyLogger
AntiDebug
AntiVM
MSOffice File
VirusTotal
Malware
Code Injection
unpack itself
3.2
40
ZeroCERT
15042
2023-03-08 11:20
clip64.dll
3d8d9e5e16ff723493d7a4399647df50
UPX
Malicious Library
Admin Tool (Sysinternals etc ...)
OS Processor Check
DLL
PE32
PE File
VirusTotal
Malware
PDB
Checks debugger
unpack itself
2.0
M
54
ZeroCERT
15043
2023-03-08 11:18
handdiy_2.exe
c40e098b934dd5baaff26717530d6d4d
Gen2
Trojan_PWS_Stealer
Credential
User Data
Generic Malware
UPX
Malicious Library
Malicious Packer
SQLite Cookie
Anti_VM
OS Processor Check
PE32
PE File
PNG Format
Browser Info Stealer
VirusTotal
Malware
suspicious privilege
MachineGuid
Code Injection
Checks debugger
WMI
Creates executable files
ICMP traffic
exploit crash
Windows utilities
suspicious process
WriteConsoleW
installed browsers check
Tofsee
Windows
Exploit
Browser
ComputerName
Remote Code Execution
DNS
crashed
1
Keyword trend analysis
×
Info
×
https://www.ippfinfo.top/
4
Info
×
www.ippfinfo.top(178.18.252.110)
iplogger.org(148.251.234.83) - mailcious
148.251.234.83
178.18.252.110
5
Info
×
ET POLICY IP Check Domain (iplogger .org in DNS Lookup)
ET POLICY IP Check Domain (iplogger .org in TLS SNI)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
ET DNS Query to a *.top domain - Likely Hostile
10.2
M
48
ZeroCERT
15044
2023-03-08 11:18
nigga.exe
01d648ecf27b3e9a6415af8fab167ac9
PE32
PE File
VirusTotal
Malware
unpack itself
crashed
1.6
M
37
ZeroCERT
15045
2023-03-08 11:16
vbc.exe
d218c65b01376996973170a38e0ec238
RAT
.NET EXE
PE32
PE File
VirusTotal
Malware
PDB
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
5.8
M
32
ZeroCERT
First
Previous
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
Next
Last
Total : 49,696cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword