Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
2191
2025-02-05 11:20
exacag.exe
42994901f5bc8b43588bb54889f1db81
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
2.0
M
57
ZeroCERT
2192
2025-02-05 11:18
CPDB.exe
daf531be28ca056a8e9a40966ab83cf0
AsyncRAT
Malicious Library
Malicious Packer
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
2
Info
×
otrodia8912.gleeze.com(45.157.233.241)
45.157.233.241
1
Info
×
ET INFO DYNAMIC_DNS Query to a *.gleeze .com Domain
2.2
M
53
ZeroCERT
2193
2025-02-05 11:17
setupqw.msi
05b777e864c9f032329acadbc747309b
Generic Malware
Malicious Library
MSOffice File
CAB
OS Processor Check
VirusTotal
Malware
suspicious privilege
Check memory
Checks debugger
unpack itself
AntiVM_Disk
VM Disk Size Check
ComputerName
1
Keyword trend analysis
×
Info
×
http://kagkimuoakomksww.xyz:443/api/client_hello
2
Info
×
kagkimuoakomksww.xyz(92.118.10.45)
92.118.10.45
2.6
M
20
ZeroCERT
2194
2025-02-05 11:13
1.exe
f3388b09788fed42a72a7814e4a11f0c
Antivirus
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
suspicious privilege
MachineGuid
Check memory
Checks debugger
unpack itself
AntiVM_Disk
VM Disk Size Check
Windows
ComputerName
DNS
Cryptographic key
1
Info
×
46.153.112.54
4.6
M
51
ZeroCERT
2195
2025-02-05 11:11
winX32.exe
eee37f6f66eafa13d9555dfc9ccb3805
PE File
.NET EXE
PE32
Lnk Format
GIF Format
Malware download
njRAT
VirusTotal
Malware
AutoRuns
suspicious privilege
Checks debugger
Creates shortcut
Creates executable files
unpack itself
Windows utilities
AppData folder
human activity check
Windows
ComputerName
DNS
DDNS
crashed
2
Info
×
sosomyhestor.ddns.net(46.153.112.54)
46.153.112.54
2
Info
×
ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
ET POLICY DNS Query to DynDNS Domain *.ddns .net
6.4
57
ZeroCERT
2196
2025-02-05 11:11
yellow.exe
5125c8d07ebd11f19059d85563aad787
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
1.2
54
ZeroCERT
2197
2025-02-05 11:09
ffcr.exe
e9f22b285bfdc648a11f40e416b0ebb3
RedLine stealer
Malicious Library
UPX
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Windows
DNS
Cryptographic key
1
Info
×
45.67.231.189
5.2
M
54
ZeroCERT
2198
2025-02-05 11:09
purple.exe
7f9e6ae4381a4d660ccd36287de98a4e
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
1.2
53
ZeroCERT
2199
2025-02-05 11:07
green.exe
38277b5fdd427b6b992203fe22060214
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
1.2
52
ZeroCERT
2200
2025-02-05 11:06
32.ps1
7de4a17dfc66695461f0c6a70ca4ec49
Generic Malware
Antivirus
ZIP Format
VirusTotal
Malware
powershell
Check memory
buffers extracted
unpack itself
Check virtual network interfaces
WriteConsoleW
Windows
ComputerName
Cryptographic key
2
Info
×
shaileshvisionaryastrologer.com(167.86.109.19)
167.86.109.19
3
Info
×
SURICATA Applayer Detect protocol only one direction
ET HUNTING ZIP file download over raw TCP
SURICATA Applayer Protocol detection skipped
5.2
M
23
ZeroCERT
2201
2025-02-05 11:05
Muikfjd.exe
c39dc176515df061ae18dac5290a421b
RedLine stealer
Malicious Library
Admin Tool (Sysinternals etc ...)
UPX
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
PDB
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Checks Bios
Detects VirtualBox
VMware
anti-virtualization
Windows
ComputerName
DNS
Cryptographic key
Software
1
Info
×
45.144.28.250
14.0
M
33
ZeroCERT
2202
2025-02-05 11:04
cHSzTDjVl.exe
043fe9d1a841d94435f8882125769b0c
Malicious Library
Malicious Packer
PE File
PE32
MZP Format
VirusTotal
Malware
MachineGuid
Check memory
ICMP traffic
ComputerName
DNS
1
Info
×
karahook.000webhostapp.com()
1
Info
×
ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup)
3.0
M
64
ZeroCERT
2203
2025-02-05 11:02
_ovvtLvn.exe
d39ebc382ec4e299ebfe7c2cc37677fc
Themida
Malicious Packer
UPX
PE File
PE32
VirusTotal
Malware
DNS
1
Info
×
185.49.126.140 - mailcious
2.2
M
39
ZeroCERT
2204
2025-02-05 11:02
%E4%B8%80%E9%94%AE%E5%85%B3%E9...
50faa83beefd61822a917e9dca623ac7
Generic Malware
Malicious Library
UPX
Antivirus
PE File
PE32
OS Processor Check
.NET EXE
PE64
VirusTotal
Malware
PDB
MachineGuid
Check memory
Checks debugger
Creates executable files
unpack itself
AppData folder
RCE
5.0
M
48
ZeroCERT
2205
2025-02-05 11:00
Proxifier.exe
603db03582b0bf9af87364e0a3947442
Generic Malware
Malicious Library
Antivirus
PE File
.NET EXE
PE32
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
powershell.exe wrote
suspicious process
AppData folder
Windows
ComputerName
Cryptographic key
5.4
M
50
ZeroCERT
First
Previous
141
142
143
144
145
146
147
148
149
150
Next
Last
Total : 53,463cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword