URLhaus Database

You are currently viewing the URLhaus database entry for https://go.bankroll.io/wp-includes/GAXV-wwPNiahalYmRN14_HancqHjpB-MLP/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:176449
URL: https://go.bankroll.io/wp-includes/GAXV-wwPNiahalYmRN14_HancqHjpB-MLP/
URL Status:Offline
Host: go.bankroll.io
Date added:2019-04-12 11:09:05 UTC
Last online:2019-04-12 16:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: spamhaus
Abuse complaint sent (?): Yes (2019-04-12 11:10:06 UTC to google-cloud-compliance{at}google[dot]com)
Takedown time:4 hours, 54 minutes Good (down since 2019-04-12 16:04:14 UTC)
Tags:emotet link heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2019-04-12447253754634_Apr_12_2019.docdoc f72c5e3b61465f474ca5e06389723a8369df133def8469cbea058135c0a38662Virustotal results 23.73% Heodo
2019-04-12660274006087_Apr_12_2019.docdoc 04a0e4e5809e9acffde247f6f388f9da11ec5bc45d8a07af8be6945c32012748Virustotal results 23.73% Heodo
2019-04-121164283169_Apr_12_2019.jsjs 1f18a298cc1cdd9527f5345e3ac6438cadffdbf62a1f2a4dc69a22a626980c41Virustotal results 8.62% Heodo