URLhaus Database

You are currently viewing the URLhaus database entry for http://gjfjhqvsh.top/holler/rolle4.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:2086285
URL: http://gjfjhqvsh.top/holler/rolle4.exe
URL Status:Offline
Host: gjfjhqvsh.top
Date added:2022-03-09 16:08:07 UTC
Last online:2022-03-17 02:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Blocked
DNS4EU :Not blocked
Reporter: 0x746f6d6669
Abuse complaint sent (?): Yes (2022-03-09 16:09:06 UTC to abuse{at}selectel[dot]ru)
Takedown time:7 days, 10 hours, 39 minutes Bad (down since 2022-03-17 02:48:25 UTC)
Tags:cryptbot RedLineStealer link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2022-03-16n/aexe 31a5f62bfe2a4655a855d85351e42280f479632502fdba01ccb9be29ba48fd96n/a 
2022-03-16n/aexe 94c2a1332707d2c14148bf733affde77788b73adfead50837cf8511e0640c2c6n/a 
2022-03-16n/aexe 94bf48d332498abd5d34d56b105b4a0931a07f5a5a7d40d530cdfcd4fceb2a8en/a 
2022-03-16n/aexe af066b1e6acd8d6fae285574a67a2dbd4c9cfb0b81a83cec98b40bacc3757b90n/a 
2022-03-16n/aexe 987d5f19560dcf4f8fd6970cdf9036f583954a4dce4b491ec9ed97d644a676bbn/a 
2022-03-16n/aexe ca506ad2bf0b53473ea8d5b28577bdca72f1844e892580fdf3f01280dbcbb433n/a 
2022-03-15n/aexe 636409b4be606209facf48c0672621c8e32f846c36c4914ae43354a6138bc2ccn/aCryptBot
2022-03-15n/aexe 814d98775286098fbb08c3d5529a37d35c90828de4bd88099fa011e4febd80f3n/aCryptBot
2022-03-15n/aexe 366ce101fd20bf43ad38bd45eddc210349c25672a8921ae56a2dd629dd2540abn/aCryptBot
2022-03-14n/aexe 2d38b3e2d84638d146a476b7798635569f4f8c0841166a44b628260180d10ecdn/a
2022-03-14n/aexe b2a15da178f65e13c6b4eef990679c9a1fc0856137119239ee9816ff85fd4c58n/a 
2022-03-14n/aexe c1144e14f61b4b21b4278969ce02abbd8528ba44172fccc190f1cbf28bf84d7cn/a
2022-03-14n/aexe ad03dae42c1de93bebd2a06c234cf0db09bef19dd471d32c79b84566d9b82f4eVirustotal results 50.75% 
2022-03-13n/aexe 9bca60295775e9624a7a8597be973af646ea69afc2b6b0fcf95addd567ef844cn/a 
2022-03-13n/aexe 3aa5b5117ee7006dfcf013b84a97c3e9e38c5b8de7caf380f8c4e954f5d30807n/a 
2022-03-13n/aexe d6323266f787fa50faac7e32d58753acdd33efba62bf4f676657e03406950480n/a 
2022-03-13n/aunknown e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Virustotal results 0.00% 
2022-03-13n/aexe 99701566f76a3919bf7d8723d058686465d03f98e1201077cc772ad75a825a03n/a 
2022-03-12n/aexe 2e36b04a855ca0d4e6d804ed28f3a49a417d1ba13cc4fd1313b668f9a17394d8n/a 
2022-03-12n/aexe 04a4018bd6729759c4153c753bc1d071fd1363ba472156f681ef5073d87db596n/a 
2022-03-12n/aexe ff4ff6cca818d2c3ebe3df08739e776034662851e48d053e974f4485f200cefbn/a 
2022-03-11n/aexe dfe33f8bae536f2cf1cf28a6e2193e1d72d681e039f13339ed1419951c69c914n/a 
2022-03-11n/aexe f8462784c938c32e326abdba379d8944c9600f34ad85737efd6e7866d0bedff8n/a
2022-03-11n/aexe 0d7a91ef0ad442163814602ab565a73e9952e0b4359bffe9521dc86894b9768en/a 
2022-03-10n/aexe 45435774eef3a9dd1a9dddd07e9ead0bebfcb1841aff797f434e4b429af6b9a8n/a RedLineStealer
2022-03-10n/aexe 09fcfc2d0c9bd7583991acd3361720836563084aea7dc3bbdbe3ca6048cfe65fn/a RedLineStealer
2022-03-10n/aexe adc5bc568e0178a9985a1810413e8d57be6409325b4cb0625b211abead9fb593n/a 
2022-03-10n/aexe 3406308f4cd34329d8953de533263f289209aac619c85dfe8d870472ac88f021n/a RedLineStealer
2022-03-09n/aexe 2a5731ceb2283b07bcdbe5713dad549d1f903660e1e95007e4b3f5c3d38efbb7n/a 
2022-03-09n/aexe c0f56862ac9cfc26231a5be9b87b8dc19cc54a62436a93a90c283ac7afc9b786n/a