Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
41431
2021-09-17 11:08
diagram-118.doc
4cf2a06cb2d3e70ce6bf9cc716e0cbaf
VBA_macro
Generic Malware
MSOffice File
RWX flags setting
unpack itself
1.6
guest
41432
2021-09-17 11:08
diagram-116.doc
ed7013efeb9d004aba9b9a5daa757261
VBA_macro
Generic Malware
MSOffice File
exploit crash
unpack itself
Exploit
crashed
2.4
guest
41433
2021-09-17 11:05
diagram-114.doc
876b64688a3e91ca83a24cbe82bc77b5
VBA_macro
Generic Malware
MSOffice File
RWX flags setting
unpack itself
1.6
guest
41434
2021-09-17 10:59
HTM.exe
ce5451bcdc0d951b27cb1f42d4f8a4f8
PWS
.NET framework
Generic Malware
SMTP
KeyLogger
AntiDebug
AntiVM
PE File
.NET EXE
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
suspicious privilege
MachineGuid
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Windows utilities
Check virtual network interfaces
suspicious process
AntiVM_Disk
WriteConsoleW
IP Check
VM Disk Size Check
Tofsee
Windows
Browser
Email
ComputerName
DNS
Cryptographic key
DDNS
Software
crashed
2
Keyword trend analysis
×
Info
×
http://checkip.dyndns.org/
https://freegeoip.app/xml/175.208.134.150
4
Info
×
freegeoip.app(104.21.19.200)
checkip.dyndns.org(216.146.43.70)
216.146.43.70 - suspicious
104.21.19.200
4
Info
×
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY External IP Lookup - checkip.dyndns.org
ET POLICY DynDNS CheckIp External IP Address Server Response
14.6
M
29
ZeroCERT
41435
2021-09-17 10:57
Setup12.exe
e0ef2cfe575206c8a60ddba16c3be2f5
Gen2
Emotet
UPX
Malicious Library
ASPack
PE File
PE32
OS Processor Check
PE64
Browser Info Stealer
VirusTotal
Malware
suspicious privilege
Malicious Traffic
Check memory
Checks debugger
Creates shortcut
Creates executable files
unpack itself
Check virtual network interfaces
AntiVM_Disk
IP Check
VM Disk Size Check
installed browsers check
Tofsee
Interception
Browser
ComputerName
DNS
crashed
5
Keyword trend analysis
×
Info
×
http://staticimg.youtuuee.com/api/?sid=236911&key=10e44f00f514089ad426f2df18ec0fd0
http://staticimg.youtuuee.com/api/fbtime
http://186.2.171.3/seemorebty/il.php?e=md8_8eus - rule_id: 4715
http://ip-api.com/json/
https://iplogger.org/ZhiS4
7
Info
×
iplogger.org(88.99.66.31) - mailcious
ip-api.com(208.95.112.1)
staticimg.youtuuee.com(45.136.151.102)
186.2.171.3 - mailcious
45.136.151.102
88.99.66.31 - mailcious
208.95.112.1
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY External IP Lookup ip-api.com
1
Info
×
http://186.2.171.3/seemorebty/il.php
9.6
M
51
ZeroCERT
41436
2021-09-17 10:54
Instruction.exe
b86b5f5e6345e0b9184d34bde48772f2
RAT
PWS
.NET framework
Generic Malware
PE File
OS Processor Check
.NET EXE
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Malware
suspicious privilege
Malicious Traffic
Check memory
Checks debugger
buffers extracted
WMI
unpack itself
Collect installed applications
Check virtual network interfaces
installed browsers check
Tofsee
Windows
Browser
ComputerName
DNS
Cryptographic key
Software
crashed
1
Keyword trend analysis
×
Info
×
https://api.ip.sb/geoip
3
Info
×
api.ip.sb(104.26.13.31)
94.103.9.34
104.26.13.31
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
8.8
M
35
ZeroCERT
41437
2021-09-17 10:54
2eeeewsf.exe
632ae2e6e4e1899f19b6b7ba36d3ee0e
RAT
PWS
.NET framework
Generic Malware
PE File
OS Processor Check
.NET EXE
PE32
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Windows
DNS
Cryptographic key
1
Info
×
77.83.175.169
3.6
M
36
ZeroCERT
41438
2021-09-17 10:54
newb.exe
31b923409d179c5e197785d13a17d9cb
Generic Malware
Themida Packer
PE File
.NET EXE
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Malware
suspicious privilege
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Checks Bios
Collect installed applications
Detects VMWare
Check virtual network interfaces
VMware
anti-virtualization
installed browsers check
Tofsee
Windows
Browser
ComputerName
RCE
Firmware
DNS
Cryptographic key
Software
crashed
2
Keyword trend analysis
×
Info
×
http://103.246.144.69:10975/
https://api.ip.sb/geoip
3
Info
×
api.ip.sb(104.26.13.31)
104.26.12.31
103.246.144.69
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
SURICATA HTTP unable to match response to request
10.8
M
31
ZeroCERT
41439
2021-09-17 10:54
3_Microsoft.Office.Infopath.Cl...
1e057c393a8684cd569ad803edb08980
Malicious Library
PE File
DLL
PE32
VirusTotal
Malware
unpack itself
Windows
crashed
2.4
M
26
ZeroCERT
41440
2021-09-17 10:50
zW22iRETmqE.dll
c678bbd306d11244564339371a8136ae
RAT
Generic Malware
PE File
.NET DLL
DLL
PE32
VirusTotal
Malware
PDB
1.0
M
10
ZeroCERT
41441
2021-09-17 10:50
luboe.exe
e8fd991862a9c88bab9e967992e572ae
RAT
PWS
.NET framework
Generic Malware
PE File
OS Processor Check
.NET EXE
PE32
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Windows
DNS
Cryptographic key
1
Info
×
185.93.6.114
3.4
M
27
ZeroCERT
41442
2021-09-17 10:50
instal.exe
3a00ac1d224382941045b8673a3b66a0
Themida Packer
Admin Tool (Sysinternals etc ...)
Malicious Library
PE File
.NET EXE
PE32
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
Checks Bios
Detects VMWare
VMware
anti-virtualization
Windows
RCE
Firmware
DNS
Cryptographic key
crashed
1
Info
×
109.248.11.182
8.8
M
31
ZeroCERT
41443
2021-09-17 10:07
sepcon.exe
8b932daa6b317c6baef47bf2a2646e38
UPX
Malicious Library
PE File
PE32
VirusTotal
Malware
RWX flags setting
unpack itself
Tofsee
RCE
crashed
1
Keyword trend analysis
×
Info
×
https://cdn.discordapp.com/attachments/856925952004063242/887741718500368394/Wqoqmxwsxttksdzrkzpmhvyndcocgqt
2
Info
×
cdn.discordapp.com(162.159.129.233) - malware
162.159.133.233 - malware
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
3.2
M
42
ZeroCERT
41444
2021-09-17 10:05
vbc.exe
c1035f9cbed8afef93eae63e9a00bdb9
PWS
.NET framework
Generic Malware
SMTP
KeyLogger
AntiDebug
AntiVM
PE File
.NET EXE
PE32
VirusTotal
Malware
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
ComputerName
crashed
8.8
M
21
ZeroCERT
41445
2021-09-17 10:03
SJFIIEESD-7.exe
ea3e64c8d0945a81842d2a3a925949d7
RAT
Generic Malware
Antivirus
PE File
.NET EXE
PE32
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
powershell.exe wrote
suspicious process
AppData folder
Windows
ComputerName
Cryptographic key
crashed
6.8
M
48
ZeroCERT
First
Previous
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
Next
Last
Total : 53,953cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword