URLhaus Database

You are currently viewing the URLhaus database entry for http://lutanedukasi.co.id/wp-includes/makanaki.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:2446790
URL: http://lutanedukasi.co.id/wp-includes/makanaki.exe
URL Status:Offline
Host: lutanedukasi.co.id
Date added:2022-12-05 19:50:15 UTC
Last online:2022-12-07 20:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Status unknown
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: abuse_ch
Abuse complaint sent (?): Yes (2022-12-05 19:51:15 UTC to abuse{at}isi[dot]co[dot]id)
Takedown time:2 days, 0 hours, 32 minutes Poor (down since 2022-12-07 20:23:32 UTC)
Tags:AveMariaRAT link exe rat

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2022-12-06n/aexe 3650e941f589db93a518d602e4b0ddd9a54c7c42f3d1d06bdda467651cbb95f7n/aAveMariaRAT
2022-12-06n/aexe 3707533042d67a657b987ec153e0b5711f0c4d06377ee5143759483698bc7f48n/aAveMariaRAT
2022-12-06n/aexe a604be01cfee0dd2f3fdb6af8ed840668908d2dd268d2564486b4390d5eab66eVirustotal results 35.71%AveMariaRAT
2022-12-05n/aexe 80e28fcc8b571c2c8fe075896d03ed473e825bb56296563f3d5dffaa22fe0ccbVirustotal results 34.72%AveMariaRAT