URLhaus Database

You are currently viewing the URLhaus database entry for http://muk.nu/US_us/download/Copy_Invoice/nKgSJ-gSPW4_NU-BW/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:119455
URL:http://muk.nu/US_us/download/Copy_Invoice/nKgSJ-gSPW4_NU-BW/
URL Status:Offline
Host:muk.nu
Date added:2019-02-07 15:45:04 UTC
Threat:Malware download Malware download
Google Safe Browsing:Clean
Spamhaus DBL:Not listed
SURBL:Not listed
Reporter:@spamhaus
Abuse complaint sent (?): Yes (2019-02-07 18:36:09 UTC to abuse{at}locaweb[dot]com[dot]br)
Takedown time:2 hours, 59 minutes Good
Tags:emotet heodo

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTSignature
2019-02-07MJOXX13141030722.docdoc3a1d36bb4fa3753426ff2301e1e4dac4e3764f73981ea4596318ed341e3ed1e1Virustotal results 19 / 57 (33.33)
2019-02-07CR479198057477348462.docdoce6d0b03a588b0979b766e6f86a232408b5af0b9696f05c08cc7c1363c5a5145fVirustotal results 19 / 57 (33.33)Heodo
2019-02-07276576944.docdocb8c4c2a766945ed6217c9b7633457bf3a97c2437c0b8eda59d928213172703d9Virustotal results 20 / 55 (36.36)Heodo
2019-02-07US65352582492.docdoc2e24d3f008b0283c9a83c64958fc5385d85da33afa32476c523174060d02787cVirustotal results 18 / 55 (32.73)Heodo
2019-02-07US35999114661429203.docdoc1867e7a5bfe52b395d24deb45df5857259b899114bedd3fcf9121492e375912fVirustotal results 19 / 57 (33.33)Heodo
2019-02-07Q131468353.docdoc0e80da5e0ec57b5e100053f98d6293eff6c3701ff0596368bc7829ea37360eb7Virustotal results 19 / 57 (33.33)Heodo
2019-02-073286046339.docdoc37409356018984c06a897758997850053c90ec29f19053bb27fe141339955b34Virustotal results 19 / 57 (33.33)
2019-02-07US017624403388409.docdoc2840a5a82efcf6393cfc003511e361e05cc6048b849f970faedf8394deae5e50Virustotal results 20 / 56 (35.71)Heodo
2019-02-0732121008999740458.docdoc9cd84b5aacec951372374b6586f54aa9beed779dd1e58ea93a8d0f085b210634Virustotal results 20 / 56 (35.71)Heodo
2019-02-07QT167308672188737.docdocf81cbda08e84ae04c23977537e7235afe9d7ca55a004e26532719fe3b87d6757Virustotal results 20 / 56 (35.71)
2019-02-075251324265884643.docdocb546c132ff4020b18e2fa59f10976fe5bd728ef9ca09ce0da487c6997078d297Virustotal results 19 / 57 (33.33)Heodo
2019-02-07PTLA65247254836114.docdoc11fd527d351670884c6fff835f3f3b0cbfec1d6b65cce489363a240848731e71Virustotal results 18 / 55 (32.73)Heodo
2019-02-07JXP70961568188438.docdoc8b5c5f97f442338acc2acad94e9225315d50f05779f0c3c4141d7e93142f61feVirustotal results 19 / 58 (32.76)
2019-02-07US776490722132.docdoca47143ff4c9ac8cc600747f244ae6746bc2ef2589188a1c3948f358fe5b51ef9Virustotal results 20 / 57 (35.09)Heodo
2019-02-07PAY1912144917163636321.docdoca33bd6497d52c1160a06d3e87cca05a806eafd4d2c4aad38eddd2dd2bcee5164Virustotal results 19 / 56 (33.93)Heodo
2019-02-0744275807707034364.docdoc286ffbc06d9229d3d60405669be7c952a23b5ef563326bd0bef57e28e587d620Virustotal results 20 / 58 (34.48)Heodo
2019-02-0720392148008117512.docdocb7a4f8dd8e1dd86f786cd4928a423324e1beb7385a41df019340869880745f8aVirustotal results 19 / 58 (32.76)Heodo