URLhaus Database

You are currently viewing the URLhaus database entry for http://ditec.com.my/CwZtu_OZwd-j/ZS/Attachments/022019/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:118726
URL:http://ditec.com.my/CwZtu_OZwd-j/ZS/Attachments/022019/
URL Status:Offline
Host:ditec.com.my
Date added:2019-02-06 19:51:14 UTC
Threat:Malware download Malware download
Google Safe Browsing:Clean
Spamhaus DBL:Abused domain (malware)
SURBL:Blacklisted
Reporter:@Cryptolaemus1
Abuse complaint sent (?): Yes (2019-02-06 19:54:03 UTC to abuse{at}ramnode[dot]com)
Takedown time:9 hours, 4 minutes Good
Tags:doc emotet epoch1 heodo

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTSignature
2019-02-07payment_02072019.docdoc8895394638778b766ff4e0b0aae95a798736b1f36eeae2afe9c5c277727f8098n/aHeodo
2019-02-07receipt_20190207.docdoc9b6dc058e3dc5de11bd34fd959a8309c4ad348c93fdc19701c19dec2a7c47dden/aHeodo
2019-02-07bill_JAN2019.docdoc642c732d55c00cbd91f5e34e55a49a8e5ee45a853416a54dab4421abcd6c5f1cn/a
2019-02-07PAY_JAN2019.docdoc4f8fdfe8526ea7d5bb6db0e6c8d8f4e6694fa6469aa45896d08d358af25521ben/a
2019-02-07invoice_02-07-2019.docdoc0897c8f8b6a70627fdab1b2335d71da294cd38fc82eb777277b98f1a44382131n/aHeodo
2019-02-07ebill_file_20190207.docdoc9b0e250e8aae1d392b530d4d31380b1834584e0a86618782061eb07dad65a891n/aHeodo
2019-02-07PAY_02-07-2019.docdocae994399d94a06860a63dd7b218979937f4c527bcd928d684d00f5dda4fe3ea9n/aHeodo
2019-02-07ebill_file_02-07-2019.docdocf44ae0d2bb6cec28020502576defa0dec4d6e41aa2ee25f93843036cf1996f1dn/aHeodo
2019-02-07invoice_2019JAN.docdoc724ce45f640444c37e891f239f1b13223655e2e8253f8adfeb88787ffdc0f528n/aHeodo
2019-02-07ebill_file_02072019.docdoccaefde7582d46e41e65554ca2dc9cdf55d62181a124a5ffbd8003b7f151f1fb0Virustotal results 16 / 57 (28.07)Heodo
2019-02-07invoice_JAN2019.docdoc26469408219b887df60cd56535a6e379eaf9afcd04be2db1755e5a950f8ce9dcVirustotal results 17 / 57 (29.82)Heodo
2019-02-06ebill_file_02-07-2019.docdoc2b67c86d483a57bf0f7cf24078c24bf99c6a052201b2df4e727497bde4e42d1fVirustotal results 18 / 56 (32.14)Heodo
2019-02-06invoice_2019JAN.docdoc585d8ce9664b03d8d9e4da1ae06600822abfe8c95a7ae0f7834a4085148a6a3bVirustotal results 18 / 57 (31.58)Heodo
2019-02-06PAY_20190207.docdoc35cc89d32e7882a7fb220c22b227d373b4c6a3dc4fc8817ebe3273f9622a0426Virustotal results 19 / 57 (33.33)Heodo
2019-02-06payment_2019-02-07.docdocf11212d2d2dc938b0ceb51f8cfb793915a1d2b4013190a8a803b04c12d415510Virustotal results 18 / 57 (31.58)
2019-02-06invoice_02-07-2019.docdoc9ec427f45a5da2747138306297b47821e1a76f4bc3c2cd60d0a9045159aeaae3n/aHeodo
2019-02-06ebill_file_2019_02_07.docdoc2592be2a10b1e52ef80fb77126745873f03138a30f89f50936c14d5f84cca536Virustotal results 19 / 56 (33.93)Nabucur
2019-02-06PAY_02072019.docdoc3e82d9dbd76f905546a20cc91b8fbd76b1c3ea6b2b1f2cab8cfcb9d4b98ef190Virustotal results 19 / 57 (33.33)Heodo
2019-02-06payment_2019_02_07.docdoc0eb80f73097dc072841ffb2aa7b6910f52a6d811c11803bcaf7ef2a2137b1f79Virustotal results 18 / 56 (32.14)Heodo
2019-02-06PAY_JAN2019.docdoc43cd3d2029712d7414bbcc2a9b271d27f711a2ff2eb03bfabef0f754edbe9c3cVirustotal results 19 / 56 (33.93)Heodo
2019-02-06invoice_02072019.docdoc8e2d48a299369f7e1b7ab2d5d41e1fe138b773b9ae4b64ed411cc56adf133f06Virustotal results 19 / 57 (33.33)Heodo
2019-02-06ebill_file_20190207.docdoc7d683fbb6f52f007005d4be144a68a83bd9f61399988885bf7396689f8964a16Virustotal results 19 / 57 (33.33)
2019-02-06PAY_02062019.docdoc66560ecae1fa34327556f3a3ae7c82915435249b023141c390a3f52c3f460a20n/aHeodo