Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
14041
2023-04-19 11:09
proactive_notification-2023-04...
be86b0476d58977807baa8705238b7c7
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
14042
2023-04-19 11:07
TransparencyTopic-2023-04-18-0...
c9f7c97f79ddacf70c48747de0599deb
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
14043
2023-04-19 11:07
RTCReporting_messageLog_2023-0...
8c706bf15eb784a8625c339866c74c66
ScreenShot
AntiDebug
AntiVM
Check memory
unpack itself
1.0
guest
14044
2023-04-19 11:07
text.txt
aff607a762145b76e8d0921ec8ef5329
ScreenShot
AntiDebug
AntiVM
Check memory
unpack itself
1.0
guest
14045
2023-04-19 11:06
mac-vendors-export.json
19c4f4b54817b4e53a3d006d96447928
Anti_VM
AntiDebug
AntiVM
OS Processor Check
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
14046
2023-04-19 11:06
T-Mobile-2023-04-18-004804.ips
ea8361168fbb63584d4b451f26e924c9
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
14047
2023-04-19 11:05
WiFiLQMMetrics-2023-04-17-1704...
1661b9f129bfdd9c94bc68262e821622
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
14048
2023-04-19 09:39
za.xlsx
8d1c5cf6f85743869f7272d487bb180a
ZIP Format
exploit crash
unpack itself
Exploit
crashed
1.8
ZeroCERT
14049
2023-04-19 09:37
Funds_792120.wsf
dbf85f39dd98463b298f50302d64ea40
VBScript
heapspray
wscript.exe payload download
Tofsee
DNS
Dropper
3
Keyword trend analysis
×
Info
×
https://pastebin.com/raw/zD5ag0UX - rule_id: 29932
https://pastebin.com/raw/mJfkXNYx - rule_id: 29928
http://216.120.201.169/aSxBaqnfj98wz.dat
3
Info
×
pastebin.com(104.20.67.143) - mailcious
216.120.201.169 - mailcious
172.67.34.170 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
2
Info
×
https://pastebin.com/raw/zD5ag0UX
https://pastebin.com/raw/mJfkXNYx
10.0
M
ZeroCERT
14050
2023-04-19 09:29
script.ps1
126d0143c4a72b552b57453b5144bdae
Generic Malware
Antivirus
AutoRuns
Check memory
unpack itself
WriteConsoleW
Windows
Cryptographic key
1
Keyword trend analysis
×
Info
×
https://gold-fish.top/glazgo.zip
2.2
ZeroCERT
14051
2023-04-19 09:10
fotocr20.exe
d4c4291d2799089c25fd112ad2d03774
Gen1
Emotet
UPX
Malicious Library
CAB
PE32
PE File
Browser Info Stealer
FTP Client Info Stealer
AutoRuns
PDB
suspicious privilege
Check memory
Checks debugger
buffers extracted
WMI
Creates executable files
unpack itself
Disables Windows Security
Collect installed applications
AntiVM_Disk
VM Disk Size Check
installed browsers check
Windows
Update
Browser
ComputerName
Remote Code Execution
DNS
Cryptographic key
Software
crashed
1
Info
×
185.161.248.152
10.4
M
ZeroCERT
14052
2023-04-19 09:08
wcncsvc.exe
751eb8303e9c86d2b68e6dfac0754af0
Malicious Packer
.NET EXE
PE32
PE File
VirusTotal
Malware
Buffer PE
AutoRuns
suspicious privilege
MachineGuid
Check memory
Checks debugger
buffers extracted
unpack itself
human activity check
Windows
ComputerName
DNS
DDNS
3
Info
×
testrun123.hopto.org(24.184.74.42)
24.184.74.42
212.8.244.201 - mailcious
1
Info
×
ET POLICY DNS Query to DynDNS Domain *.hopto .org
9.0
M
66
ZeroCERT
14053
2023-04-19 09:06
contrem2.1.exe
08186cde92790a745f1e6fbf706fc800
UPX
Malicious Library
PE32
PE File
OS Processor Check
Remcos
VirusTotal
Malware
AutoRuns
Malicious Traffic
Check memory
Checks debugger
Creates executable files
unpack itself
AppData folder
WriteConsoleW
Windows
DNS
DDNS
1
Keyword trend analysis
×
Info
×
http://geoplugin.net/json.gp
4
Info
×
geoplugin.net(178.237.33.50)
katruda.duckdns.org(212.8.244.201)
178.237.33.50
212.8.244.201 - mailcious
3
Info
×
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
ET JA3 Hash - Remcos 3.x TLS Connection
5.4
M
33
ZeroCERT
14054
2023-04-19 09:04
Funds_366728.wsf
dc0ded1a1a05a26960a9adbf3cc5e5cb
VBScript
heapspray
wscript.exe payload download
unpack itself
Tofsee
DNS
crashed
Dropper
3
Keyword trend analysis
×
Info
×
https://pastebin.com/raw/mJfkXNYx
https://pastebin.com/raw/zD5ag0UX
http://216.120.201.169/aSxBaqnfj9.dat
3
Info
×
pastebin.com(172.67.34.170) - mailcious
216.120.201.169 - mailcious
104.20.68.143 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
10.0
M
ZeroCERT
14055
2023-04-19 09:04
Funds_589281.wsf
3d90344c5976a644b6e482e9a325d9cb
VBScript
Check memory
heapspray
wscript.exe payload download
unpack itself
Tofsee
DNS
crashed
Dropper
3
Keyword trend analysis
×
Info
×
https://pastebin.com/raw/mJfkXNYx
https://pastebin.com/raw/zD5ag0UX
http://216.120.201.169/aSxBaqnfj98wz.dat
3
Info
×
pastebin.com(104.20.68.143) - mailcious
216.120.201.169 - mailcious
172.67.34.170 - mailcious
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
10.0
M
ZeroCERT
First
Previous
931
932
933
934
935
936
937
938
939
940
Next
Last
Total : 49,697cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword