URLhaus Database

You are currently viewing the URLhaus database entry for http://157.230.140.145/yakuza.mpsl which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:101412
URL:http://157.230.140.145/yakuza.mpsl
URL Status:Offline
Host:157.230.140.145
Date added:2019-01-04 08:02:04 UTC
Threat:Malware download Malware download
Google Safe Browsing:Clean
Spamhaus DBL:Unknown
SURBL:Not listed
Reporter:@zbetcheckin
Abuse complaint sent (?): Yes (2019-01-04 08:04:01 UTC to abuse{at}digitalocean[dot]com)
Takedown time:11 hours, 27 minutes Good
Tags:bashlite elf gafgyt

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTSignature
2019-01-04n/aelf311bba55894d6c050301e343b95a339e836be064d39075834753052a83741aebVirustotal results 21 / 57 (36.84)