URLhaus Database
Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).
Database Entry
| Host: | vnjt.top |
|---|---|
| Domain registrar: | Alibaba ![]() |
| Domain registration date: | 2022-03-03 08:45:13 UTC |
| Spamhaus DBL : | Not blocked |
| SURBL : | Not blocked |
| Quad9 : | Status unknown |
| AdGuard : | Not blocked |
| Cloudflare : | Blocked |
| ProtonDNS : | Status unknown |
| OpenBLD : | Not blocked |
| DNS4EU : | Not blocked |
| Control D HaGeZi : | Not blocked |
| Firstseen: | 2021-03-18 16:02:04 UTC |
| Total malware sites : | 8 |
| Online malware sites : | 0 (0%) |
| Offline Malware sites : | 8 (100%) |
| A record(s) observed : | 1 |
IP addresses
The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.
| Firstseen (UTC) | IP address | Hostname | SBL | ASN | Country | Active? |
|---|---|---|---|---|---|---|
| 2021-03-18 16:02:06 | 34.78.181.3 | 3.181.78.34.bc.googleusercontent.com | Not listed | AS396982 GOOGLE-CLOUD-PLATFORM | BE | no |
Malware URLs
The table below shows all malware URLs that are associated with this particular host.
| Dateadded (UTC) | URL | Status | Tags | Reporter |
|---|---|---|---|---|
| 2021-03-18 16:11:03 | http://vnjt.top/files/penelop/updatewin2.exe | Offline | exe | |
| 2021-03-18 16:10:06 | http://vnjt.top/files/penelop/updatewin1.exe | Offline | exe | |
| 2021-03-18 16:07:05 | http://vnjt.top/files/1/dubi.exek | Offline | exe stop | |
| 2021-03-18 16:06:04 | http://vnjt.top/files/1/start.exea | Offline | exe stop | |
| 2021-03-18 16:05:05 | http://vnjt.top/files/penelop/5.exe | Offline | ArkeiStealer | |
| 2021-03-18 16:04:06 | http://vnjt.top/files/iner/5.exe | Offline | ArkeiStealer | |
| 2021-03-18 16:04:05 | http://vnjt.top/files/cost/5.exe | Offline | ArkeiStealer | |
| 2021-03-18 16:02:06 | http://vnjt.top/files/1/dubi.exe | Offline | exe stop |
The table below shows recent payloads delivery by this host.
| Firstseen (UTC) | SHA256 hash | File type | Bazaar | Signature |
|---|---|---|---|---|
| 2021-03-18 16:11:03 | 5caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d | exe | ||
| 2021-03-18 16:10:05 | 14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e | exe | ||
| 2021-03-18 16:07:05 | 9bf5a22089f0b74627320945df991bd1dfa37bf5522f8ecb61e5873bc6093f22 | exe | Ransomware.Stop | |
| 2021-03-18 16:06:04 | 6c747049b34b13fee03f951bc3b0f330aab130d3f1ecd4e39df734a94d4442d1 | exe | Ransomware.Stop | |
| 2021-03-18 16:05:05 | a8fe17654d8f2a952fee93bd6e78864ee4a2e766c92e6ba7dda2b0117e1ef97a | exe | ArkeiStealer | |
| 2021-03-18 16:04:06 | a8fe17654d8f2a952fee93bd6e78864ee4a2e766c92e6ba7dda2b0117e1ef97a | exe | ArkeiStealer | |
| 2021-03-18 16:04:05 | a8fe17654d8f2a952fee93bd6e78864ee4a2e766c92e6ba7dda2b0117e1ef97a | exe | ArkeiStealer | |
| 2021-03-18 16:02:05 | b055016e0d82c57b58cd126f26b4b8f4dae1441f0019bdaa42452e815f128944 | exe | Ransomware.Stop |

BE