URLhaus Database

You are currently viewing the URLhaus database entry for http://hypercustom.top/jollion/apines.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:1552560
URL: http://hypercustom.top/jollion/apines.exe
URL Status:Offline
Host: hypercustom.top
Date added:2021-08-21 19:44:08 UTC
Last online:2021-09-02 07:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: abuse_ch
Abuse complaint sent (?): Yes (2021-08-21 19:45:02 UTC to admin{at}time-host[dot]net)
Takedown time:11 days, 11 hours, 33 minutes Bad (down since 2021-09-02 07:18:11 UTC)
Tags:cryptbot exe opendir RedLineStealer link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2021-09-01n/aexe d6007d59009ba577d65fbd1e122dffeec2cd0771c34445cd263e1c2699c21368n/a RedLineStealer
2021-08-31n/aexe 0648b1ab9937a98ee4aba023573e64bfa6b533f5f15d29c42a0cae43844e026dn/a RedLineStealer
2021-08-30n/aexe 4da095e0a59cecad3fbfc6fa4f33c00e71edc9fffae041a521552390825732f7n/aRedLineStealer
2021-08-29n/aexe 82b0161335f3e5103150aedc18f94ea8cecbe00871668de002af752e9cfff9ddn/a RedLineStealer
2021-08-28n/aexe 0c53ee5bbb0e0624fb8281a8b8850e6f190a97aae229fb9f7bfd0e054988f5e8n/a RedLineStealer
2021-08-27n/aexe 45a87dd4abe07b6c5f296a9ff716f5224b38dd17e4fd8789819a6c9cbcfda55cn/a RedLineStealer
2021-08-26n/aexe 25a8d52e15f54022a9efdfaf2c3f8bf94e36dc475d428fcb880c953f1bbaf2c6n/a RedLineStealer
2021-08-25n/aexe cce16e3c61f188234483344b7e95f174df1b6708002a6a0ae63ab197745c8090n/a RedLineStealer
2021-08-25n/aexe abc87c7b821bb7bba854958ecd20760e63c9365aff2091edc2b8449040263a67Virustotal results 56.72%CryptBot
2021-08-24n/aexe 8b46a621bdeee821d8688fc152c9ebcba9b4d274cba2d4550787a79da83dce04n/a RedLineStealer
2021-08-23n/aexe 374fe48e2677be33b362d63a5d0f306a29fd7cd0e19302b8bdf4dbbebf46b16bn/aRedLineStealer
2021-08-22n/aexe 1995d5c5569c14b92d2dd5d849b8a06b5e27280ac6cddaaacc3c00584741a6d0n/a RedLineStealer
2021-08-22n/aexe 45682ad0823016643d27985aa1d5d0dcffe4be09ddaac5419d0447342d9c6f0bn/a RedLineStealer
2021-08-21n/aexe fdcde927665c3300db41bbe2c93005756f7da11fef5557ec5c9c5fa7196bf32cn/a RedLineStealer
2021-08-21n/aexe c5749c5654d0508326fdf6a51dd8ec091724a6beb711654650c032ab618e9749Virustotal results 53.73% RedLineStealer