URLhaus Database

You are currently viewing the URLhaus database entry for http://eyafun.com/wp-includes/534-mr-28527/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:300673
URL: http://eyafun.com/wp-includes/534-mr-28527/
URL Status:Offline
Host: eyafun.com
Date added:2020-01-29 02:21:07 UTC
Last online:2020-01-29 06:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-01-29 02:22:02 UTC to qcloud_net_duty{at}tencent[dot]com)
Takedown time:3 hours, 41 minutes Good (down since 2020-01-29 06:03:40 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-01-29Inv_JQ0_42092163.docdoc bdcef0f16c70086414ff95b69fdbbe7eb0c9814308d3d60143b6c04dfc077257Virustotal results 45.31% Heodo
2020-01-29Invoice_YRAQ0_12826951.docdoc f6879431b901df789082452c1c4ffa29e857d247886e421df6dda5fb3d81ca5eVirustotal results 46.77% Heodo
2020-01-29INVOICE_GG279_5767099.docdoc 4a821bdd3d078f334c0bd64c125a412ad54ce14cdf5216cfed93b6ac8401d318Virustotal results 46.88% Heodo
2020-01-29invoice-FGVQ0332_316841.docdoc 1e4b01e3e146ff01a3782b01680a5165432af556331d599ec6ad35b4983b216fVirustotal results 31.75%