Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
2521
2024-07-04 09:46
ggrace.vbs
82e15bfd5d0ba8fb1f211f4b04c3e404
VirusTotal
Malware
VBScript
wscript.exe payload download
crashed
Dropper
1
Keyword trend analysis
×
Info
×
https://paste.ee/d/PYjOy
2
Info
×
paste.ee(185.26.104.247) - mailcious
185.26.104.247 - mailcious
10.0
M
7
ZeroCERT
2522
2024-07-04 09:46
file_iet2mvl3.idw.txt.vbs
35fc934c763040e9f35474eacffe3e34
unpack itself
crashed
0.6
ZeroCERT
2523
2024-07-04 09:45
MOVE.vbs
17a1424e8ac08659157d2d0f0d143de9
Generic Malware
Antivirus
Hide_URL
PowerShell
VirusTotal
Malware
VBScript
powershell
suspicious privilege
Malicious Traffic
Check memory
Checks debugger
buffers extracted
wscript.exe payload download
Creates shortcut
unpack itself
Check virtual network interfaces
suspicious process
Tofsee
Windows
ComputerName
DNS
Cryptographic key
Dropper
3
Keyword trend analysis
×
Info
×
http://91.92.254.29/Users_API/HURRICANE/file_2n4kbwex.dbr.txt
http://airstreamsa.in.net/ajai/wave.txt
https://ia803405.us.archive.org/16/items/new_image_202406/new_image.jpg
3
Info
×
ia803405.us.archive.org(207.241.232.195) - mailcious
91.92.254.29 - mailcious
207.241.232.195 - mailcious
2
Info
×
ET DROP Spamhaus DROP Listed Traffic Inbound group 13
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
10.0
M
7
ZeroCERT
2524
2024-07-04 09:44
fress.vbs
eadbe0d07dc98f935224d3ccea5c6b96
VirusTotal
Malware
VBScript
wscript.exe payload download
Dropper
1
Keyword trend analysis
×
Info
×
https://paste.ee/d/7HCkx
2
Info
×
paste.ee(185.26.104.247) - mailcious
185.26.104.247 - mailcious
10.0
M
12
ZeroCERT
2525
2024-07-04 09:43
realtekdriver.exe
662404ed188bfab5386fc73a0a7732d4
Malicious Library
PE File
.NET EXE
PE32
VirusTotal
Malware
Buffer PE
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
ComputerName
Cryptographic key
3.8
M
53
ZeroCERT
2526
2024-07-04 09:41
Bitwarden-Installer-2024.6.3.e...
06e9439beabd1813ff13295adbba48ff
Generic Malware
Malicious Library
Malicious Packer
UPX
AntiDebug
AntiVM
PE File
ftp
PE32
OS Processor Check
FTP Client Info Stealer
VirusTotal
Malware
Telegram
PDB
MachineGuid
Code Injection
Malicious Traffic
Check memory
WMI
unpack itself
Windows utilities
Collect installed applications
suspicious process
AppData folder
WriteConsoleW
anti-virtualization
installed browsers check
Tofsee
Windows
Browser
ComputerName
Remote Code Execution
DNS
Software
2
Keyword trend analysis
×
Info
×
https://steamcommunity.com/profiles/76561199730044335
https://t.me/bu77un
5
Info
×
t.me(149.154.167.99) - mailcious
steamcommunity.com(104.75.41.21) - mailcious
104.87.193.17
149.154.167.99 - mailcious
95.217.241.48
3
Info
×
ET INFO Observed Telegram Domain (t .me in TLS SNI)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
10.8
10
ZeroCERT
2527
2024-07-04 09:39
systemd.exe
da4b6f39fc024d2383d4bfe7f67f1ee1
Generic Malware
Malicious Library
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
PDB
unpack itself
Tofsee
crashed
1
Keyword trend analysis
×
Info
×
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
2
Info
×
bitbucket.org(43.202.69.9) - malware
104.192.141.1 - mailcious
2
Info
×
ET INFO TLS Handshake Failure
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
2.0
44
ZeroCERT
2528
2024-07-04 09:38
CNO.txt.exe
cf6bd97368f587fc689f0cc96702e02e
Browser Login Data Stealer
Generic Malware
Malicious Library
Downloader
Malicious Packer
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
Windows
DNS
keylogger
1
Info
×
216.9.224.18 - mailcious
4.0
61
ZeroCERT
2529
2024-07-04 09:36
SWSS.txt.exe
cd385c30936cf9cf395b32ba14cfac70
Browser Login Data Stealer
Generic Malware
Malicious Library
Downloader
Malicious Packer
UPX
PE File
PE32
OS Processor Check
Remcos
VirusTotal
Malware
Malicious Traffic
Check memory
ICMP traffic
DNS
DDNS
1
Keyword trend analysis
×
Info
×
http://geoplugin.net/json.gp
4
Info
×
geoplugin.net(178.237.33.50)
authurremcsupdate.duckdns.org()
192.3.101.18
178.237.33.50
3
Info
×
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4.0
68
ZeroCERT
2530
2024-07-04 07:45
csrss.exe
a2dcc2e9dd81e3a5f6440ed7027a86da
PE File
PE64
VirusTotal
Malware
PDB
MachineGuid
Check memory
Checks debugger
unpack itself
2.2
34
ZeroCERT
2531
2024-07-04 07:43
loader.exe
edc8dc2a71af650c1c6272efa564adc3
Generic Malware
Malicious Library
UPX
PE File
PE64
OS Processor Check
PE32
VirusTotal
Malware
PDB
Creates executable files
unpack itself
AppData folder
Remote Code Execution
crashed
3.8
46
ZeroCERT
2532
2024-07-04 07:40
38.exe
40ecc726bee273961d09301c0316af6e
Malicious Library
UPX
PE File
PE32
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
crashed
2.4
M
54
ZeroCERT
2533
2024-07-04 07:38
ABC.exe
2808310786effc87a4359c778a73a7ee
UPX
PE File
.NET EXE
PE32
VirusTotal
Malware
PDB
suspicious privilege
Check memory
Checks debugger
unpack itself
ComputerName
2.8
42
ZeroCERT
2534
2024-07-04 07:36
injector.exe
509c110ee54d73c3398140a5eb78c45a
NSIS
Malicious Library
UPX
Confuser .NET
PE File
PE32
.NET EXE
VirusTotal
Malware
Microsoft
suspicious privilege
Check memory
Checks debugger
Creates executable files
unpack itself
AppData folder
ComputerName
DNS
crashed
1
Info
×
94.156.71.43
2
Info
×
ET DROP Spamhaus DROP Listed Traffic Inbound group 15
ET INFO Microsoft net.tcp Connection Initialization Activity
5.2
57
ZeroCERT
2535
2024-07-04 02:39
http://py.pl/I7mIC
6cb7e9e8e7161d8a30c49a4228aafaaf
Downloader
Create Service
Socket
DGA
Http API
ScreenShot
Escalate priviledges
Steal credential
PWS
Hijack Network
Sniff Audio
HTTP
DNS
Code injection
Internet API
persistence
FTP
KeyLogger
P2P
AntiDebug
AntiVM
MSOffice File
PNG Format
JPEG Format
VirusTotal
Malware
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
1
Keyword trend analysis
×
Info
×
http://py.pl/I7mIC
2
Info
×
py.pl(151.101.66.133)
151.101.194.133 - phishing
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
5.6
guest
First
Previous
161
162
163
164
165
166
167
168
169
170
Next
Last
Total : 48,289cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword