Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
4516
2024-12-28 10:29
BootstrapperV1.23_1.exe
02c70d9d6696950c198db93b7f6a835e
Malicious Library
.NET framework(MSIL)
UPX
PE File
PE64
.NET EXE
VirusTotal
Malware
suspicious privilege
Check memory
Checks debugger
unpack itself
Windows utilities
Check virtual network interfaces
suspicious process
Windows
ComputerName
crashed
2
Info
×
gitlab.com(172.65.251.78) - malware
getsolara.dev(104.21.93.27) - mailcious
4.4
57
guest
4517
2024-12-24 15:05
AD.exe
877cefe82dcee5f8e9961f020a636b2b
Browser Login Data Stealer
Generic Malware
Malicious Library
Downloader
Malicious Packer
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
Windows
keylogger
1
Info
×
newstaticfreepoint24.ddns-ip.net(181.131.217.244)
2.2
55
ZeroCERT
4518
2024-12-19 08:47
3344.exe
c2fd049f5e4af19811db14b28e1d9bdc
UPX
PE File
PE64
VirusTotal
Malware
Code Injection
RWX flags setting
DNS
crashed
1
Info
×
45.43.36.223
5.0
56
ZeroCERT
4519
2024-12-19 08:45
evetbeta.exe
6f6137e6f85dc8dac7ff87ca4c86af4c
Browser Login Data Stealer
Malicious Library
Downloader
Malicious Packer
UPX
PE File
PE32
VirusTotal
Malware
Checks debugger
WriteConsoleW
2
Info
×
tr3.localto.net(5.75.234.8)
5.75.234.8
3.4
69
ZeroCERT
4520
2024-12-19 08:42
nj.exe
fd683344e5fc0a2dc8693f32ff45bf1f
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
2.0
59
ZeroCERT
4521
2024-12-19 08:41
stail.exe
8e48644d626b1e2ee1a0fe4f117848ba
Emotet
Gen1
Generic Malware
Malicious Library
UPX
PE File
PE32
MZP Format
DLL
OS Processor Check
CHM Format
PE64
VirusTotal
Malware
Checks debugger
Creates executable files
unpack itself
AppData folder
ComputerName
crashed
4.2
40
ZeroCERT
4522
2024-12-19 08:41
Invoice_Final.exe
b304c075b26e1080ad3162b03c77d246
Gen1
Generic Malware
Malicious Library
ASPack
UPX
Malicious Packer
PE File
PE64
OS Processor Check
DLL
ZIP Format
VirusTotal
Malware
Check memory
Checks debugger
Creates executable files
unpack itself
3.4
49
ZeroCERT
4523
2024-12-19 08:40
svchost.exe
41858a9907ffd870b55a8ffef5aa1593
Gen1
Generic Malware
Malicious Library
ASPack
UPX
Malicious Packer
PE File
PE64
OS Processor Check
DLL
ZIP Format
Check memory
Checks debugger
Creates executable files
suspicious process
crashed
2.2
ZeroCERT
4524
2024-12-19 08:40
Discordd.exe
17bbb12504a20c0c2544c8dac52ed0a1
AsyncRAT
task schedule
Downloader
Malicious Packer
.NET framework(MSIL)
UPX
Create Service
Socket
DGA
Http API
ScreenShot
Escalate priviledges
Steal credential
PWS
Sniff Audio
HTTP
DNS
Code injection
Internet API
FTP
KeyLogger
P2P
AntiDebug
AntiVM
PE File
VirusTotal
Malware
AutoRuns
Code Injection
Windows utilities
suspicious process
AppData folder
WriteConsoleW
Windows
ComputerName
DNS
2
Info
×
18.ip.gl.ply.gg(147.185.221.18)
147.185.221.18
1
Info
×
ET INFO Tunneling Service in DNS Lookup (* .ply .gg)
4.8
60
ZeroCERT
4525
2024-12-19 08:39
basx.exe
15581964a92aa9bf2949d0555c9ba6ce
Emotet
Gen1
Generic Malware
Malicious Library
UPX
PE File
PE32
MZP Format
DLL
OS Processor Check
CHM Format
PE64
VirusTotal
Malware
Checks debugger
Creates executable files
unpack itself
AppData folder
ComputerName
crashed
3.4
33
ZeroCERT
4526
2024-12-19 08:39
sintv.exe
38fcaa23700e62fb0b3fc2591f82cc80
Malicious Library
.NET framework(MSIL)
UPX
PE File
PE64
.NET EXE
OS Processor Check
Browser Info Stealer
VirusTotal
Malware
Telegram
PDB
MachineGuid
Check memory
Checks debugger
unpack itself
Check virtual network interfaces
installed browsers check
Tofsee
Windows
Browser
ComputerName
DNS
Cryptographic key
2
Info
×
api.telegram.org(149.154.167.220) - mailcious
149.154.167.220 - mailcious
3
Info
×
ET HUNTING Telegram API Domain in DNS Lookup
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
4.0
37
ZeroCERT
4527
2024-12-18 18:30
sharpmonoinjector.exe
4522bc113a6f5b984e9ffac278f9f064
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
2.0
57
ZeroCERT
4528
2024-12-18 18:27
NJRAT%20DANGEROUS.exe
401b1ea00d135d5060f237c2f5a8a6c4
Antivirus
UPX
PE File
.NET EXE
PE32
OS Processor Check
njRAT
NetWireRC
VirusTotal
Malware
suspicious privilege
MachineGuid
Check memory
Checks debugger
unpack itself
AntiVM_Disk
VM Disk Size Check
Windows
ComputerName
Cryptographic key
4.6
55
ZeroCERT
4529
2024-12-18 18:25
clip64.dll
2b252fcee2eec5371a13e6615abfcc22
Amadey
Generic Malware
Malicious Library
UPX
PE File
DLL
PE32
OS Processor Check
VirusTotal
Malware
Malicious Traffic
Checks debugger
unpack itself
DNS
1
Keyword trend analysis
×
Info
×
http://62.60.226.15/8fj482jd9/index.php
1
Info
×
62.60.226.15
3.6
51
ZeroCERT
4530
2024-12-18 18:23
goldlummaa.exe
876bf2dec67ea8626322d2c268219d76
Generic Malware
Malicious Library
UPX
ScreenShot
AntiDebug
AntiVM
PE File
PE32
OS Processor Check
VirusTotal
Malware
Code Injection
buffers extracted
unpack itself
7.0
55
ZeroCERT
First
Previous
301
302
303
304
305
306
307
308
309
310
Next
Last
Total : 54,212cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword