URLhaus Database

You are currently viewing the URLhaus database entry for http://diamondsparkle.co.ke/aloe.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:1890245
URL: http://diamondsparkle.co.ke/aloe.exe
URL Status:Offline
Host: diamondsparkle.co.ke
Date added:2021-12-16 10:36:12 UTC
Last online:2021-12-20 14:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2021-12-16 10:37:50 UTC to abuse{at}colocrossing[dot]com)
Takedown time:4 days, 3 hours, 48 minutes Bad (down since 2021-12-20 14:26:18 UTC)
Tags:AsyncRAT link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2021-12-20n/aexe 558ebe5c5c4d1de2f1f98eecad14d74367de21dc62ff86cf5145be9cd32fc67fn/aAsyncRAT
2021-12-19n/aexe 629dc612afbe80b9704d39489291dcd957e84709894e19c962170b3f82d3fe8cn/aAsyncRAT
2021-12-17n/aexe adbeb59939b56b701446d79c10c6af29c287a621b4522f53c481582eb926924dn/aAsyncRAT
2021-12-17n/aexe a9c1dd5c5d75819771e541e646968e4c01bc12b2eb648e8cf553462e8e76fe74Virustotal results 40.58%AsyncRAT
2021-12-16n/aexe e635607848d3a7b2b37cbe0c77d7d06d60bfa5bbb4615437147e68fbf81cbb8bn/aAsyncRAT
2021-12-16n/aexe b9548f24f2d0048e0e3acaf9bf97cb15a84c87ff6aa83d5e49317c33fe1cc3a2n/aAsyncRAT