Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
13216
2021-10-07 11:49
DMWN_04995676543-567654466543....
ad56b381a24fd7faefbba99bce158b68
Generic Malware
Admin Tool (Sysinternals etc ...)
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
Buffer PE
AutoRuns
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
Creates executable files
unpack itself
Windows utilities
suspicious process
AppData folder
WriteConsoleW
human activity check
Windows
ComputerName
DNS
DDNS
2
Info
×
1116.hopto.org(185.140.53.9) - mailcious
185.140.53.9 - mailcious
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.hopto .org
15.8
22
ZeroCERT
13217
2021-10-07 12:22
MTB1056 Proforma.exe
c050088cde2c6e479d294c4eda274c78
UPX
Malicious Library
PE File
PE32
VirusTotal
Malware
Remote Code Execution
1.6
33
ZeroCERT
13218
2021-10-07 12:23
Narudžba hr 647382992 05-10-20...
d7833f2338528f468a4e63e7715882f1
PWS
.NET framework
Generic Malware
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
Buffer PE
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows utilities
suspicious process
WriteConsoleW
human activity check
Windows
ComputerName
DNS
DDNS
crashed
2
Info
×
alliedtrade54321.ddns.net(197.210.52.210)
197.210.52.210
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
14.2
32
ZeroCERT
13219
2021-10-07 12:25
purchase order.exe
da920aa97025c8a36d30c6a4035f9ed5
Generic Malware
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
Buffer PE
AutoRuns
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
human activity check
Windows
DNS
DDNS
3
Info
×
luf.ddns.net(79.134.225.71)
79.134.225.71 - mailcious
37.235.1.174 - mailcious
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
13.0
ZeroCERT
13220
2021-10-07 12:59
QUOTATION IN USD_ORDER ENQUIR...
3d2728a819ac5baf91b09f21490a0f37
Generic Malware
Antivirus
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
powershell
Buffer PE
AutoRuns
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
Creates shortcut
unpack itself
Windows utilities
powershell.exe wrote
suspicious process
WriteConsoleW
human activity check
Windows
ComputerName
DNS
Cryptographic key
DDNS
3
Info
×
accept.ddns.net(185.140.53.50) - mailcious
37.235.1.174 - mailcious
185.140.53.50
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
14.8
ZeroCERT
13221
2021-10-07 12:59
SWIFT.exe
5fac4473e58b2fedf57ee47008bc7ff4
Generic Malware
Antivirus
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
Buffer PE
AutoRuns
PDB
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
Creates shortcut
unpack itself
Windows utilities
suspicious process
WriteConsoleW
human activity check
Windows
ComputerName
DNS
Cryptographic key
DDNS
2
Info
×
blackb.duckdns.org(185.244.30.252) - mailcious
185.244.30.252
1
Info
×
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
16.2
29
ZeroCERT
13222
2021-10-07 13:02
Swift Copy pdf.exe
604ff60ab55652c44862fad411f633b1
Generic Malware
Antivirus
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
powershell
Buffer PE
AutoRuns
PDB
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
Creates shortcut
unpack itself
Windows utilities
powershell.exe wrote
suspicious process
WriteConsoleW
human activity check
Windows
ComputerName
DNS
Cryptographic key
DDNS
3
Info
×
norly519.ddns.net(129.205.113.2) - mailcious
37.235.1.174 - mailcious
129.205.113.2
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
15.4
36
ZeroCERT
13223
2021-10-07 13:07
invoice and packing lists.exe
c4eb7021d718e3531a2ed050be4b0fed
PWS
.NET framework
Generic Malware
Antivirus
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
Buffer PE
AutoRuns
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
Creates shortcut
unpack itself
Windows utilities
suspicious process
WriteConsoleW
human activity check
Windows
ComputerName
DNS
Cryptographic key
DDNS
3
Info
×
luf.ddns.net(79.134.225.71)
79.134.225.71 - mailcious
37.235.1.174 - mailcious
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
13.2
ZeroCERT
13224
2021-10-07 13:07
TMK~00000596556788765-45678765...
2b837e8dffa99a78683aa683f287904d
Generic Malware
Admin Tool (Sysinternals etc ...)
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
Buffer PE
AutoRuns
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
Creates executable files
unpack itself
Windows utilities
suspicious process
AppData folder
WriteConsoleW
human activity check
Windows
ComputerName
DNS
DDNS
2
Info
×
1116.hopto.org(185.140.53.9) - mailcious
185.140.53.9 - mailcious
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.hopto .org
15.8
22
ZeroCERT
13225
2021-10-07 13:15
PLATBA-06-10-21.exe
f01f582a8ec6b760ebfb59eda10b0b43
Malicious Packer
Admin Tool (Sysinternals etc ...)
UPX
Malicious Library
PE File
PE32
GIF Format
VirusTotal
Malware
Creates shortcut
AntiVM_Disk
VM Disk Size Check
2.8
62
Kim.GS
13226
2021-10-07 13:32
Update of the OFFICE PACK.doc
614679aaac8791504e5885c9c4e97b58
RTF File
doc
VirusTotal
Malware
Malicious Traffic
buffers extracted
DNS
1
Keyword trend analysis
×
Info
×
http://45.14.226.221/cdfe/Fack.jpg - rule_id: 6066
1
Info
×
45.14.226.221 - malware
1
Info
×
http://45.14.226.221/cdfe/Fack.jpg
4.0
M
33
ZeroCERT
13227
2021-10-07 13:40
Update of the OFFICE PACK.doc
614679aaac8791504e5885c9c4e97b58
RTF File
doc
VirusTotal
Malware
Malicious Traffic
buffers extracted
DNS
1
Keyword trend analysis
×
Info
×
http://45.14.226.221/cdfe/Fack.jpg - rule_id: 6066
1
Info
×
45.14.226.221 - malware
1
Info
×
http://45.14.226.221/cdfe/Fack.jpg
4.0
M
33
조광섭
13228
2021-10-07 13:47
Update of the OFFICE PACK.doc
614679aaac8791504e5885c9c4e97b58
RTF File
doc
VirusTotal
Malware
Malicious Traffic
buffers extracted
DNS
1
Keyword trend analysis
×
Info
×
http://45.14.226.221/cdfe/Fack.jpg - rule_id: 6066
1
Info
×
45.14.226.221 - malware
1
Info
×
http://45.14.226.221/cdfe/Fack.jpg
4.0
M
33
조광섭
13229
2021-10-07 14:21
Swift Copy pdf.exe
604ff60ab55652c44862fad411f633b1
Generic Malware
Antivirus
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
VirusTotal
Malware
powershell
Buffer PE
AutoRuns
PDB
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
Creates shortcut
unpack itself
Windows utilities
powershell.exe wrote
suspicious process
WriteConsoleW
human activity check
Windows
ComputerName
DNS
Cryptographic key
DDNS
3
Info
×
norly519.ddns.net(185.244.30.198) - mailcious
37.235.1.174 - mailcious
129.205.113.2
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
15.4
36
조광섭
13230
2021-10-07 14:41
Swift Copy pdf.exe
604ff60ab55652c44862fad411f633b1
email
stealer
Generic Malware
Antivirus
ScreenShot
Steal credential
DNS
AntiDebug
AntiVM
PE File
PE32
.NET EXE
Browser Info Stealer
Malware download
Nanocore
VirusTotal
Email Client Info Stealer
Malware
c&c
powershell
Buffer PE
AutoRuns
PDB
suspicious privilege
MachineGuid
Code Injection
Check memory
Checks debugger
buffers extracted
Creates shortcut
Creates executable files
unpack itself
Windows utilities
powershell.exe wrote
suspicious process
malicious URLs
AntiVM_Disk
WriteConsoleW
VM Disk Size Check
human activity check
Windows
Browser
Email
ComputerName
DNS
Cryptographic key
DDNS
3
Info
×
norly519.ddns.net(185.244.30.198) - mailcious
37.235.1.174 - mailcious
185.244.30.198 - mailcious
2
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
ET MALWARE Possible NanoCore C2 60B
17.8
36
조광섭
First
Previous
881
882
883
884
885
886
887
888
889
890
Next
Last
Total : 49,434cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword