URLhaus Database

You are currently viewing the URLhaus database entry for http://saflairtravel.co.za/language/invoice/xh1q13uav4h/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:299974
URL: http://saflairtravel.co.za/language/invoice/xh1q13uav4h/
URL Status:Offline
Host: saflairtravel.co.za
Date added:2020-01-28 13:23:31 UTC
Last online:2020-01-30 13:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-01-28 13:24:02 UTC to abusepoc{at}afrinic[dot]net)
Takedown time:2 days, 0 hours, 26 minutes Poor (down since 2020-01-30 13:50:38 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-01-30INV_73K3ABDHI.docdoc 7578501f349034c9a89ebd79a8c301a6ca55760813992475ecaa08b3c4a6d19cVirustotal results 22.22% 
2020-01-29SW_40619951974762725752926.docdoc 135e6e64bd7742b372ada6b825319eb55fa6081a563f2bb5b8c41b146badb7e9Virustotal results 32.26%Heodo
2020-01-29RP_09850281834383522242488.docdoc 2974d01a1a4da0562902c3971327dcc14301362344429bb27e64548127418106Virustotal results 26.98% Heodo
2020-01-29FILE_YW1CHQ5BAQ0.docdoc 3bf12769229661d5dd0a25950302e189697b914c141c2afd1b39219a381a4becVirustotal results 24.19% 
2020-01-29INV_68899105378383961976336.docdoc a29ffa3c4cece33a8bb942606525a7dc279ee36fb1ee9946d794c97797310494Virustotal results 45.16% Heodo
2020-01-29VHIS_999824040.docdoc 9a2abc9155e18efb1548021402f8578ce66099b0adcf510eeb438bad3fc4deffVirustotal results 42.62% Heodo
2020-01-29PAY_UJ8715917006HQ.docdoc 73ffcf3917c7f7401b0297d6f84db15da8bec68a139c48ab7b406ca0bbc80cc4Virustotal results 42.86% Heodo
2020-01-29REP_1TYP0T5Q8K.docdoc 130a5ecbb3f69579a5aa81511bab80615debda2fbc9c723f1d0303fa44013a4eVirustotal results 42.19% 
2020-01-28158818724460487468.docdoc 0d9df05fda4de4dc764d3276175ad0a1de0b5e4cb03147cf4e0774894d9406b2Virustotal results 41.94% Heodo
2020-01-28ST_PO_01282020EX.docdoc 1b7bc827a4727fa1be41320c628be6adc8c15da1cd8ae42f0400a0dba37b93e6n/a Heodo
2020-01-28ST_PO_01282020EX.docdoc 2cd773be059ef5c10f0086ca698219a2a0a0ffaabb746ef1d222b8dba4d72db1n/a 
2020-01-28INV_JX2586659404HV.docdoc a071cfd9577ae6b11aa6de2ca78546f2ed01a47d933c15f8e72b5cf206e0db10Virustotal results 23.44% Heodo
2020-01-28SW_212016882.docdoc 0efaa47b7d2c3efbca4bb435066b0dcd90e4db922f87c14d48f611f0668896d4n/a Heodo
2020-01-28DOC_V7IPUFB0.docdoc 90f977ed1e868e0b99172cfbc0464433732aa449c859ee1548be0c82b78d4357Virustotal results 22.22% Heodo