URLhaus Database

You are currently viewing the URLhaus database entry for http://digolftournament.com/Client/Payment/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:25353
URL: http://digolftournament.com/Client/Payment/
URL Status:Offline
Host: digolftournament.com
Date added:2018-06-29 13:23:13 UTC
Last online:2018-09-08 07:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Blocked
DNS4EU :Not blocked
Reporter:Anonymous
Abuse complaint sent (?): Yes (2018-06-29 13:30:09 UTC to abuse{at}godaddy[dot]com)
Tags:doc emotet link heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2018-06-29n/aunknown e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Virustotal results 0.00% 
2018-06-29INV-051252439.docdoc ce81b63d91b172cbed0381af3f131f3fa5d68d8094d7a9a5c0678dab71fc5c1cVirustotal results 16.07% Heodo
2018-06-29INV-1426533.docdoc 74e0061aee58bd36d7bec66a14e4d2dc00e629c07e3ed315dea5defc2a6f7545Virustotal results 19.30% Heodo
2018-06-29INV-788821249006791.docdoc 7dfc23080f8137553bfa6546b2c67226a78b59ac941188d668c2f51ab2e89fd3Virustotal results 20.34% Heodo
2018-06-29INV-8797652790010.docdoc 34494ec3196631f2abc2e780339ba3d6376ce09d8b5dc0a7e2bba427155f44f9Virustotal results 18.64% Heodo