URLhaus Database

You are currently viewing the URLhaus database entry for http://wsdyrkkrsuccessmorev.dns.army/receiprt/win32.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:1068327
URL: http://wsdyrkkrsuccessmorev.dns.army/receiprt/win32.exe
URL Status:Offline
Host: wsdyrkkrsuccessmorev.dns.army
Date added:2021-03-15 09:22:06 UTC
Last online:2021-03-17 12:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: abuse_ch
Abuse complaint sent (?): Yes (2021-03-15 09:23:04 UTC to abuse{at}vnn[dot]vn,abuse{at}vdc[dot]com[dot]vn)
Takedown time:2 days, 2 hours, 42 minutes Poor (down since 2021-03-17 12:05:49 UTC)
Tags:AgentTesla link exe Loki link opendir

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2021-03-17n/aexe 2445069618da1fdf45a88f372d379387380fdf5ae5368ab6e2fe9c890f9c337cn/aLoki
2021-03-16n/aexe e642d220db68e25410126ef7318bec5a75067d776035e90637ecb7b382f37712n/aLoki
2021-03-16n/aexe 416af6fcddde9ba2a0fc38e66a511e64e420cd19a2ad1a66c5e9c0947b4943a9n/aLoki
2021-03-16n/aexe 2ae14d2874d1d5981effca3d214370367a27ee587436e879522a99b851697245n/aLoki
2021-03-15n/aexe 4709c17e3a1cde10a874ee2d42b7ea213b9de8763f0e43ec438a78f46609f965Virustotal results 13.04%AgentTesla