Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
42871
2021-08-15 12:49
felix1008.exe
f37bc82cabddf6a2435471b1ccaabd28
NPKI
RAT
Generic Malware
Malicious Library
UPX
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
AntiVM
PE
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
WMI
Creates executable files
unpack itself
Windows utilities
Collect installed applications
Check virtual network interfaces
suspicious process
AppData folder
malicious URLs
AntiVM_Disk
WriteConsoleW
VM Disk Size Check
installed browsers check
Tofsee
Windows
Browser
ComputerName
DNS
Cryptographic key
Software
crashed
2
Keyword trend analysis
×
Info
×
http://193.188.22.4:45689/
https://api.ip.sb/geoip
4
Info
×
ZsOlgCDvrndcMghomKmKknuQKyI.ZsOlgCDvrndcMghomKmKknuQKyI()
api.ip.sb(104.26.12.31)
172.67.75.172
193.188.22.4
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
SURICATA HTTP unable to match response to request
14.0
M
38
ZeroCERT
42872
2021-08-15 12:47
22.exe
bb01110f000d6a06eb3bce0024aaedc1
RAT
Generic Malware
PE File
PE64
VirusTotal
Malware
MachineGuid
Check memory
Checks debugger
unpack itself
Windows
Cryptographic key
3.0
M
30
ZeroCERT
42873
2021-08-15 12:46
file.exe
4538e3df24ed8b8cd6a3474b2f0e1f74
UPX
Malicious Library
PE File
OS Processor Check
PE32
VirusTotal
Malware
PDB
unpack itself
2.2
M
24
ZeroCERT
42874
2021-08-15 12:45
wj1.png
b3edf0682d10790927ec8cdf5f1f187e
PE File
DLL
PE32
VirusTotal
Malware
Checks debugger
WMI
unpack itself
ComputerName
crashed
3.4
M
28
ZeroCERT
42875
2021-08-15 12:44
lv.exe
5da707c4db06e0549e3c2067df1a0256
Emotet
Gen1
Gen2
Malicious Library
UPX
Malicious Packer
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
VirusTotal
Malware
AutoRuns
Code Injection
Check memory
Checks debugger
Creates executable files
unpack itself
Windows utilities
AppData folder
malicious URLs
AntiVM_Disk
WriteConsoleW
VM Disk Size Check
Windows
1
Info
×
NJIEjqRTbnIYnAiJRPvlKPyOPF.NJIEjqRTbnIYnAiJRPvlKPyOPF()
7.4
M
42
ZeroCERT
42876
2021-08-15 12:43
lv.exe
82e9bcd3cc8af226349d5f310b452213
Emotet
Gen1
Gen2
Malicious Library
UPX
Malicious Packer
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
VirusTotal
Malware
AutoRuns
Code Injection
Check memory
Checks debugger
Creates executable files
unpack itself
Windows utilities
AppData folder
malicious URLs
AntiVM_Disk
WriteConsoleW
VM Disk Size Check
Windows
DNS
2
Info
×
steFXKdeZnohWpsetIVYKrVdVcv.steFXKdeZnohWpsetIVYKrVdVcv()
131.153.76.130 - mailcious
7.0
M
19
ZeroCERT
42877
2021-08-15 12:41
sefile.exe
970dac7d9d006a955e21a10241c65afc
UPX
Malicious Library
PE File
OS Processor Check
PE32
VirusTotal
Malware
PDB
unpack itself
2.2
M
24
ZeroCERT
42878
2021-08-15 12:41
svchost.exe
4197eeb783ac6250fe918d469d0805f0
RAT
Generic Malware
DNS
Socket
Create Service
BitCoin
Escalate priviledges
KeyLogger
Code injection
AntiDebug
AntiVM
PE File
PE64
VirusTotal
Malware
AutoRuns
suspicious privilege
MachineGuid
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
Creates executable files
unpack itself
Windows utilities
Auto service
Check virtual network interfaces
suspicious process
malicious URLs
sandbox evasion
WriteConsoleW
Tofsee
Windows
Browser
ComputerName
Firmware
1
Keyword trend analysis
×
Info
×
https://bitbucket.org/Sanctam/sanctam/raw/d2123dc19ea65d0fdce7b5d17328d978c42b18cc/includes/xmrig
6
Info
×
pool.hashvault.pro(131.153.76.130) - mailcious
bitbucket.org(104.192.141.1) - malware
sanctam.net(185.65.135.248) - mailcious
185.65.135.248 - mailcious
131.153.76.130 - mailcious
104.192.141.1 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
15.0
M
41
ZeroCERT
42879
2021-08-15 12:39
toolspab2.exe
ea15500c87c5662e58d8539b47ff988c
UPX
Malicious Library
AntiDebug
AntiVM
PE File
OS Processor Check
PE32
VirusTotal
Malware
PDB
Code Injection
Checks debugger
buffers extracted
unpack itself
7.2
M
24
ZeroCERT
42880
2021-08-15 12:39
lv.exe
39d1258b4cc2d9085157dc6c8e84f0fe
Emotet
Gen1
Gen2
Malicious Library
UPX
Malicious Packer
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
VirusTotal
Malware
AutoRuns
Code Injection
Check memory
Checks debugger
Creates executable files
unpack itself
Windows utilities
AppData folder
malicious URLs
AntiVM_Disk
WriteConsoleW
VM Disk Size Check
Windows
1
Info
×
TvSScrJIMoRAnEIyuQoPwDNyb.TvSScrJIMoRAnEIyuQoPwDNyb()
6.6
M
41
ZeroCERT
42881
2021-08-15 12:37
twixrf.exe
f78f2e70b20587810b755e56821a0363
RAT
PWS
.NET framework
Generic Malware
UPX
PE File
OS Processor Check
.NET EXE
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Malware
suspicious privilege
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Collect installed applications
Check virtual network interfaces
installed browsers check
Tofsee
Windows
Browser
ComputerName
DNS
Cryptographic key
Software
crashed
2
Keyword trend analysis
×
Info
×
http://185.224.132.232:64354/
https://api.ip.sb/geoip
3
Info
×
api.ip.sb(104.26.13.31)
104.26.12.31
185.224.132.232
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
SURICATA HTTP unable to match response to request
7.4
M
43
ZeroCERT
42882
2021-08-15 12:37
wj3.png
9dc3016597dfa1aa2980b346d16bebec
UPX
Malicious Library
PE File
OS Processor Check
DLL
PE32
VirusTotal
Malware
Checks debugger
unpack itself
1.8
M
16
ZeroCERT
42883
2021-08-15 12:36
5674d7511aa1fce0a68969dc57375b...
7532236d0a13e60372fe249271fc4fd8
UPX
Malicious Library
PE File
OS Processor Check
PE32
VirusTotal
Malware
PDB
unpack itself
2.0
16
ZeroCERT
42884
2021-08-15 12:33
jushenkotak.exe
4ff6c915da988f6746263dc2eb000261
NPKI
RAT
Generic Malware
Malicious Library
UPX
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
AntiVM
PE
VirusTotal
Malware
AutoRuns
Code Injection
Malicious Traffic
Check memory
Checks debugger
WMI
Creates executable files
unpack itself
Windows utilities
Check virtual network interfaces
suspicious process
AppData folder
malicious URLs
AntiVM_Disk
WriteConsoleW
VM Disk Size Check
Tofsee
Windows
ComputerName
3
Keyword trend analysis
×
Info
×
http://activityhike.com/files/red28.exe
https://activityhike.com/files/red28.exe
https://activityhike.com/core.php
3
Info
×
GtNmHgYRUJvNBAMdDUxmwxiv.GtNmHgYRUJvNBAMdDUxmwxiv()
activityhike.com(95.142.37.102) - malware
95.142.37.102 - malware
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
9.6
32
ZeroCERT
42885
2021-08-15 12:33
tonys1008.exe
a08fedd1af1461cd057783b833b75c1a
NPKI
RAT
Generic Malware
Malicious Library
UPX
Anti_VM
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
A
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
WMI
Creates executable files
unpack itself
Windows utilities
Collect installed applications
Check virtual network interfaces
suspicious process
AppData folder
malicious URLs
AntiVM_Disk
WriteConsoleW
VM Disk Size Check
installed browsers check
Tofsee
Windows
Browser
ComputerName
DNS
Cryptographic key
Software
crashed
2
Keyword trend analysis
×
Info
×
http://193.188.22.4:45689/
https://api.ip.sb/geoip
4
Info
×
GjRKywIJjtMTKKgWHMJNvwsK.GjRKywIJjtMTKKgWHMJNvwsK()
api.ip.sb(104.26.13.31)
104.26.12.31
193.188.22.4
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
SURICATA HTTP unable to match response to request
12.8
26
ZeroCERT
First
Previous
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
Next
Last
Total : 54,215cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword