URLhaus Database

You are currently viewing the URLhaus database entry for http://nubul.org/calendar/LkWx/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:267784
URL: http://nubul.org/calendar/LkWx/
URL Status:Offline
Host: nubul.org
Date added:2019-12-12 18:13:06 UTC
Last online:2019-12-13 14:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: spamhaus
Abuse complaint sent (?): Yes (2019-12-12 18:14:07 UTC to dnsadmin{at}alchemy[dot]net,abuse{at}alchemy[dot]net)
Takedown time:19 hours, 47 minutes Good (down since 2019-12-13 14:01:25 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2019-12-13Invoice-WS23_260.docdoc 1d9d018983c19aba80412aef9e7c2d0f7e71c28ae8770d785819ef49fb467c5aVirustotal results 26.23% Heodo
2019-12-13INVOICE LX314_8944.docdoc 8b8ded209425b5c5d423cfcbb8da8b8809483ce2bf76d62b410b1b971f45f861n/a 
2019-12-13invoice-CMA777_34.docdoc 706b9f216096b918ed5f19af7d81997092dad599ee5cb345f1c65b70ee9499c1n/a 
2019-12-13Inv-KMJ27_42506.docdoc 31edfb48337d7ef44520d03496e5e56d45282056ef949e724b107afbd690ea63Virustotal results 24.59% 
2019-12-13Inv-ZO35_50905.docdoc 7eef3e40c5fe9e85bad4b2299a8ba6c37727189761a0ff114307b5b50952b508Virustotal results 41.67% 
2019-12-13Inv-CO92_2282.docdoc e4a4f352053438a256858f74b0c81b171da65542435b6ef0aea4c12b36022606Virustotal results 35.00% Heodo
2019-12-13Invoice SF30_08.docdoc f77de8d1ba43463a9302e94754ae39ca56fbd8ff8e0c59c0228852c7dfddd07dn/a Heodo
2019-12-13INVOICE KW722_87931.docdoc 0ea2d08799a6cce3f7c1d94ffb1657ea77c93da5a55dfe8c34a6c6e43082cd3cn/a Heodo
2019-12-12Invoice N60_16.docdoc 4e6ecdecd5d7cefb2a5ae9eb200dd55c82bdf5f1a34628177e18ed12ce96cbe6n/a Heodo
2019-12-12INVOICE_PTX76_43.docdoc 01f943474c64a4c73361a2828a1be29901330e347f3be1921978b7573a3ba61bn/a Heodo
2019-12-12Invoice-HXG388_23981.docdoc 4ab7db337b3b597fdda75aed736f5d3256721c22f9c6b3a12fb0237b7b725e8dn/a 
2019-12-12Invoice_HS59_125.docdoc 68c93898b108b7aa57c65a1e99d5063c76cec402e828d5618720a0ca1b79fb09n/a Heodo
2019-12-12Inv-X48_61279.docdoc f59f977d3187101bfbfe78bc48663ed97e0764674f803e9ad5af7607661ac4e5Virustotal results 33.33% Heodo
2019-12-12INVOICE-X33_5025.docdoc 1e01bec07135555844d07cd8c4f6585855d862a002a41b4ace1935544878a110n/a Heodo