Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
14116
2023-04-14 18:05
sydney.exe
22f586f44c42f4391e56f4fa69a4a15f
Admin Tool (Sysinternals etc ...)
SMTP
KeyLogger
AntiDebug
AntiVM
.NET EXE
PE File
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
PDB
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Check virtual network interfaces
IP Check
Tofsee
Windows
Browser
Email
ComputerName
Cryptographic key
Software
crashed
1
Keyword trend analysis
×
Info
×
https://api.ipify.org/
2
Info
×
api.ipify.org(104.237.62.211)
64.185.227.155
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
12.4
M
28
ZeroCERT
14117
2023-04-14 18:05
update_v101.exe
5505dc203820a5a773695fbdb25d79ea
Generic Malware
Themida Packer
UPX
.NET EXE
PE File
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Malware
suspicious privilege
Check memory
Checks debugger
buffers extracted
unpack itself
Checks Bios
Collect installed applications
Detects VMWare
VMware
anti-virtualization
installed browsers check
Windows
Browser
ComputerName
Firmware
Cryptographic key
Software
crashed
2
Info
×
mt.hostiko.com.ug(79.137.192.4)
79.137.192.4
8.8
M
31
ZeroCERT
14118
2023-04-14 17:49
contents
c3d54390a6d81bdb1556803767d040e9
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
BRY
14119
2023-04-14 17:49
31A1C087-CB71-4F3D-8B97-898F09...
c7392844239a6c803c44ccd7c4f8b267
ZIP Format
guest
14120
2023-04-14 17:49
contents
c3d54390a6d81bdb1556803767d040e9
Downloader
Create Service
DGA
Socket
DNS
Hijack Network
Code injection
HTTP
PWS[m]
Sniff Audio
Steal credential
Http API
P2P
Internet API
Escalate priviledges
persistence
FTP
KeyLogger
ScreenShot
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
ET INFO TLS Handshake Failure
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
4.2
BRY
14121
2023-04-14 13:40
payload2.dll
f249ab6266b09f71f05c85a966f8f3d7
PWS
.NET framework
RAT
UPX
Malicious Library
Malicious Packer
OS Processor Check
.NET EXE
PE File
PE32
Malware download
AsyncRAT
NetWireRC
VirusTotal
Malware
DNS
DDNS
2
Info
×
wbem.ddns.net(147.189.170.192) - mailcious
147.189.170.192 - mailcious
3
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
ET MALWARE Generic AsyncRAT Style SSL Cert
1.6
53
ZeroCERT
14122
2023-04-14 13:20
AprilW(uWfJ74197).wsf
d094a6e4776835a7f3bd1ed376b8f909
Generic Malware
Keylogger
Discord
Admin Tool (Sysinternals etc ...)
Antivirus
AntiDebug
AntiVM
suspicious privilege
Code Injection
Check memory
Checks debugger
Creates shortcut
unpack itself
suspicious process
Windows
ComputerName
Cryptographic key
6
Keyword trend analysis
×
Info
×
http://94.131.101.15/555555.dat
http://87.236.146.236/555555.dat
http://94.131.117.45/555555.dat
http://203.96.177.111/555555.dat
http://91.193.19.217/555555.dat
http://194.165.59.51/555555.dat
5.6
ZeroCERT
14123
2023-04-14 09:33
2016iibfex.doc
b574064bb7329b774bb0ffdb9aeaab32
MSOffice File
RWX flags setting
exploit crash
unpack itself
Exploit
DNS
crashed
1
Info
×
5.249.165.85
2.8
ZeroCERT
14124
2023-04-14 09:31
unknown.exe
ceab7da20b9fa2398c0c27e6398e7c84
RAT
UPX
Malicious Library
Malicious Packer
PE File
ZeroCERT
14125
2023-04-14 09:30
unknown.exe
a765f8edaa51aba85e51aa075cf73bf7
PWS
.NET framework
RAT
UPX
Malicious Library
Malicious Packer
OS Processor Check
.NET EXE
PE32
PE File
Malware download
AsyncRAT
NetWireRC
Malware
DNS
DDNS
2
Info
×
davidmalik07.ddns.net(5.249.165.85)
5.249.165.85
3
Info
×
ET POLICY DNS Query to DynDNS Domain *.ddns .net
ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
ET MALWARE Generic AsyncRAT Style SSL Cert
0.4
ZeroCERT
14126
2023-04-14 09:30
Keep.Exmw6519.wsf
a4715df1a2ce5a56194aa2a4bca18930
Generic Malware
Antivirus
AntiDebug
AntiVM
powershell
suspicious privilege
Code Injection
Check memory
Checks debugger
Creates shortcut
unpack itself
suspicious process
Windows
ComputerName
Cryptographic key
6
Keyword trend analysis
×
Info
×
http://87.236.146.93/sUXDKVO8C7ru.dat
http://70.34.218.85/r6Q7Jvu.dat
http://74.119.193.49/Kzm5LA.dat
http://154.47.17.180/BwT3CUGj.dat
http://79.141.174.253/lKZ838.dat
http://147.135.248.250/f5SKNYGd.dat
5.6
ZeroCERT
14127
2023-04-14 09:30
RegSvcs.exe
3f3bc2cfcf6ca2ac3768db065eee1cc3
PE File
ZeroCERT
14128
2023-04-14 09:28
.Final.txt.ps1
cb3bcf1bb12ccd8b563fb373bf306a7f
Generic Malware
Antivirus
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
Creates executable files
unpack itself
Check virtual network interfaces
suspicious process
WriteConsoleW
Tofsee
Windows
ComputerName
Cryptographic key
3
Keyword trend analysis
×
Info
×
https://makkahmart.org/.POP/.M1.jpg
https://makkahmart.org/.POP/.N1.jpg
https://makkahmart.org/.POP/.D1.jpg
2
Info
×
makkahmart.org(97.74.205.46)
97.74.205.46
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
9.4
18
ZeroCERT
14129
2023-04-14 09:28
PDFViewer.exe
fca9b3315dc5611a8a3d6a2abb838e30
PWS
.NET framework
RAT
UPX
OS Processor Check
.NET EXE
PE32
PE File
PDB
MachineGuid
Check memory
Checks debugger
unpack itself
ComputerName
crashed
1.6
18
guest
14130
2023-04-14 09:27
.Final.txt.ps1
985b35d3bc3a2a8b18c317d6306181a3
Generic Malware
Antivirus
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
Creates executable files
unpack itself
Check virtual network interfaces
suspicious process
WriteConsoleW
Tofsee
Windows
ComputerName
Cryptographic key
3
Keyword trend analysis
×
Info
×
'https://amigoasesor.com/.POP/.A.jpg
https://amigoasesor.com/.POP/.B.jpg
https://amigoasesor.com/.POP/.C.jpg
2
Info
×
amigoasesor.com(173.201.20.156)
173.201.20.156
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
9.6
20
ZeroCERT
First
Previous
941
942
943
944
945
946
947
948
949
950
Next
Last
Total : 49,696cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword