URLhaus Database

You are currently viewing the URLhaus database entry for http://partaususd.ru/asdf.EXE which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:228302
URL: http://partaususd.ru/asdf.EXE
URL Status:Offline
Host: partaususd.ru
Date added:2019-08-31 08:42:02 UTC
Last online:2019-10-08 15:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Blocked
Quad9 :Status unknown
AdGuard :Blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: zbetcheckin
Abuse complaint sent (?): Yes (2019-09-09 10:32:03 UTC to anti-spam{at}list[dot]alibaba-inc[dot]com)
Takedown time:29 days, 5 hours, 9 minutes Bad (down since 2019-10-08 15:41:33 UTC)
Tags:AZORult link exe NetWire link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2019-10-07n/aexe c323b1c61fce054bc6b51f5a0b018e9e75163398a430c77829053c874e99070en/a NetWire
2019-10-06n/aexe d5074ebcb09f4cfd113c54f2001c211faf612763de97b064d935af12f9694038n/a NetWire
2019-10-05n/aexe 1a8905a7540970f2217360a38d9c02231bd8a3a7dd04ce0d5592d8f74f9e69bcn/a 
2019-10-04n/aexe 9491b6245a6dcb2bafb479f37f5b152e938951e876ae64165d6be864a4ddeec4n/a 
2019-10-03n/aexe 87d85f037a335c6ae7e2c6f5126292d589e7f435bf498ccb7ff6d0eb3e2891e0n/a NetWire
2019-10-02n/aexe 25ea02d374261d3bfa43c9c9e870b6369416977380c57c31e182c90cf10d27cbn/a NetWire
2019-10-01n/aexe 59a0db1a1962d4ac19733cb6b09db9c3a466af9f8784c23dcf9c9fb2e56764e3n/a NetWire
2019-09-30n/aexe e91a6a2cf1bbd90ce801051ad2c3cdb8b3d7a30e3156eb4d4040ef461c475557n/a 
2019-09-29n/aexe dfcde8a83cd63668a06e61c8662fd7a5616620b26e73f3066c43ff1198f173bfn/a AZORult
2019-09-28n/aexe 5ef3e6cd6a36e404358d05f2466e181216865db67d26e46a59925ba422ab8a99n/a NetWire
2019-09-27n/aexe fba0aa7a56e03b0fcdbe81e75bb30f4cbc9c0e2793ceca25fdd76c9195d44115n/a NetWire
2019-09-26n/aexe 6ecc9c565124a0a10d48e9a162bc3b017f102d7bd6223d2cea727808335acaa7n/a NetWire
2019-09-25n/aexe a2991511c140466a2e43899f3a0f4f75a3578a80b2959fd05048b47cfd359fe5n/a NetWire
2019-09-24n/aexe 21b295fe8632d5e1a7b06e7f7b5384b5eb4403f3d4887f1740e0fb7773f3c32dn/a NetWire
2019-09-23n/aexe 8c2607698ca26d631a02e9f59d6819986b860d76a7f9e178f20d8cac7b4fc1dan/a NetWire
2019-09-22n/aexe 0ce1ee263c3d1ecd89fd1a912dab98764d03fc34f1d887905948a72cd5f1b336n/a 
2019-09-21n/aexe 1b3eed52e35e2068200ccc21984db3dd5ca23eea63544194090715ac9a981bb5n/a NetWire
2019-09-20n/aexe 759b51159d85f303d969edaa08203853feb307e9f5d86b69e1efa567dffeeb13n/a NetWire
2019-09-19n/aexe 51ef54af1060bc0e421dc2c38050efed96d7c3feb14c0dfa1b35002ac076241fn/a NetWire
2019-09-18n/aexe a36c7846f0e27dee5a53d53ff24132eb81c5e1f8ad437bc8685374118183e636n/a NetWire
2019-09-17n/aexe 50197fb4a7760a5e73a30457618f88543670607e2c8bf2fad1a10f41fff50544n/a NetWire
2019-09-16n/aexe ca45ecfadb7558e2fd1971d274c0d707de272cc97b4a383e21929814f650b10en/a NetWire
2019-09-14n/aexe d02618502b33bdb86a73cd33d2f4b8144620fcb87fdffefbd2c107aaa2f76353n/a 
2019-09-13n/aexe e4d258b78adbe54bf2bf0e4a9f7192c8ecc3813888f760560e28a7d44e59797en/a AZORult
2019-09-12n/aexe 78bb9983865b827d71d93c403facf3328d2a440ccf3998eac7a949862eeb426dn/a NetWire
2019-09-11n/aexe dbf842f60b42c9adaddabd1088d01965cf06dc8df6744197b8ed4acdb56502ebn/a AZORult
2019-09-10n/aexe 1f0b7d79bb14a7e6bb8d939e6a3f38ddbd3ef2c0446b0b69369eb39a52c2cf9dn/a 
2019-09-09n/aexe c44080672d66b21a6a11d56b4ba7b38f44fc9fd366d8a3a4e40c374592a678f0n/a 
2019-09-09n/aexe 4ceb34780302570bf05dfcf5afda959a78f712ef44c4dbd611b009cbef983fb2Virustotal results 18.84%