Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
48946
2024-10-17 13:38
Solara%20V3.exe
ed7ee066ccd2c8b4f79e033a6cce060b
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
2.0
63
ZeroCERT
48947
2024-10-17 13:39
NJRat.exe
29a37b6532a7acefa7580b826f23f6dd
njRAT
backdoor
PE File
.NET EXE
PE32
njRAT
NetWireRC
VirusTotal
Malware
WriteConsoleW
GameoverP2P
DNS
1
Info
×
startitit2-23969.portmap.host()
2
Info
×
ET POLICY DNS Query to a Reverse Proxy Service Observed
ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host)
2.0
68
ZeroCERT
48948
2024-10-17 13:40
poetsaw.exe
6ce8d30d3af9c62f590e0abd2d719a64
Generic Malware
Malicious Library
Malicious Packer
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
Malware download
NetWireRC
VirusTotal
Malware
WriteConsoleW
IP Check
RAT
ComputerName
DNS
1
Keyword trend analysis
×
Info
×
http://ip-api.com/json/
3
Info
×
ip-api.com(208.95.112.1)
45.120.178.138
208.95.112.1
3
Info
×
ET MALWARE Common RAT Connectivity Check Observed
ET POLICY External IP Lookup ip-api.com
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
3.0
63
ZeroCERT
48949
2024-10-17 13:42
Discord.exe
21af95224fabbc4909c0c8b06765f904
njRAT
backdoor
PE File
.NET EXE
PE32
VirusTotal
Malware
WriteConsoleW
DNS
4
Info
×
central-randy.gl.at.ply.gg(147.185.221.22)
147.185.221.22
208.95.112.1
45.120.178.138
2
Info
×
ET INFO playit .gg Tunneling Domain in DNS Lookup
ET INFO Tunneling Service in DNS Lookup (* .ply .gg)
3.4
62
ZeroCERT
48950
2024-10-17 13:42
injector.exe
fe891340ffcc694f1d5b72d2282e8fb7
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
2.0
55
ZeroCERT
48951
2024-10-17 14:31
Rnuwcr38IRNoHzK.exe
5fbf1c617f96d4429331f64bf2f989fe
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
0.4
M
ZeroCERT
48952
2024-10-17 14:31
new.exe
4c2a997fa2661fbfe14db1233b16364c
Antivirus
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
1.2
59
ZeroCERT
48953
2024-10-17 14:31
langla.exe
24fbdb6554fadafc115533272b8b6ea0
AsyncRAT
Malicious Library
Malicious Packer
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
1.2
M
58
ZeroCERT
48954
2024-10-17 14:31
63e909b3647d.exe
790a583c92b1575850a1a18adcb6c3bb
Generic Malware
Malicious Library
UPX
PE File
PE32
OS Processor Check
0.6
ZeroCERT
48955
2024-10-17 14:31
rundl.exe
0bc532538aea8f63c70ed009d4290c73
Browser Login Data Stealer
Generic Malware
Malicious Library
Downloader
Malicious Packer
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
1.4
61
ZeroCERT
48956
2024-10-17 14:40
WenzCord.exe
f21aa436096afece0b8c39c36bf4a9ab
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
1.6
63
ZeroCERT
48957
2024-10-17 14:40
Client-built.exe
77de6e8143094a619804ebf2d59eb094
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
1.2
M
52
ZeroCERT
48958
2024-10-17 14:40
client.exe
29de30606fa3cd9024d87066016d0351
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
1.2
55
ZeroCERT
48959
2024-10-17 14:42
test.exe
bbcaf3e91a214864140e80e2f7dad96c
njRAT
backdoor
PE File
.NET EXE
PE32
VirusTotal
Malware
1.2
M
60
ZeroCERT
48960
2024-10-17 14:42
Google%20Chrome.exe
79de31cb069a4e060aae0414fbd940fe
njRAT
backdoor
PE File
.NET EXE
PE32
VirusTotal
Malware
1.2
M
62
ZeroCERT
First
Previous
3261
3262
3263
3264
3265
3266
3267
3268
3269
3270
Next
Last
Total : 49,283cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword