URLhaus Database

You are currently viewing the URLhaus database entry for https://royaltyrealtynsb.com/backup_1/g51THhhLLUqodx6/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:2034757
URL: https://royaltyrealtynsb.com/backup_1/g51THhhLLUqodx6/
URL Status:Offline
Host: royaltyrealtynsb.com
Date added:2022-02-07 15:19:06 UTC
Last online:2022-02-07 21:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2022-02-07 15:20:24 UTC to abuse{at}digitalocean[dot]com)
Takedown time:5 hours, 47 minutes Good (down since 2022-02-07 21:08:09 UTC)
Tags:dll emotet link epoch4 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2022-02-07BzmJdLkfH.dlldll f36d2d01ee7e65b66db60acd25af5760f2e50b53919299a893d0e70372f73377Virustotal results 19.40% Heodo
2022-02-070j8oLVs3vJCTRSJEWps6J0gD.dlldll 66a1c3d658267463db9da2e3a41a8e4526b8c992da3a260c3928dbd243735aafVirustotal results 16.42% Heodo
2022-02-07aKxH.dlldll c7a1c040d4a584e18a4869530d1b47d2addf2e1b09b24049db24b188470ec257n/aHeodo
2022-02-07u.dlldll d54b1132bc06618faa52c6a09e8f2e9f131dd3fee25314c276420774f53ad1f4n/a Heodo
2022-02-07Z7hxcL7gUS647I5Vy.dlldll 93c71d6f6d2385054d09f2280cad3636f6561bacc72efbfb76ded94517945a47n/a Heodo
2022-02-07vxg6nF3nlodM.dlldll cc7fe8295cf23e2fffae1d792382947cd45284b7db29f90db14666907e3e251bn/a Heodo