URLhaus Database

You are currently viewing the URLhaus database entry for http://javapromachineryworks.com/wp-content/177w-99-34130/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:302695
URL: http://javapromachineryworks.com/wp-content/177w-99-34130/
URL Status:Offline
Host: javapromachineryworks.com
Date added:2020-01-30 10:27:02 UTC
Last online:2020-03-05 22:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?):mail Yes (Ticket DCU002286640 created on 2020-01-30 10:28:05 UTC)
Takedown time:1 month, 5 days, 12 hours, 18 minutes Bad (down since 2020-03-05 22:46:16 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-02-01Invoice-SM95_86214330.docdoc 970df6100d8375af169bb259df2c7bb1ad641294e34ed57dc3ad02a38371b4c7Virustotal results 36.51%Heodo
2020-01-31invoice_XNZX754_565904007.docdoc d603225a9202932de7c6a297c4ce3c6bfc71795689418faadb0ec35ed9af55b7Virustotal results 34.38% Heodo
2020-01-31Invoice_IN9099_569216.docdoc 7ca0f21a86976935dee8f0807bdbdbab879e3b7af287def586c99a3a6b2388efVirustotal results 20.63% Heodo
2020-01-31INVOICE-40_442719.docdoc db29ff54d37ebd7694c5190fc3ddb0ceffd896c7ed43b3f4abb8ab28658ff955Virustotal results 36.51%
2020-01-31INVOICE 484_388574660.docdoc 943444f98f1bb22118cddf2198722733aa216ad0aa313ece459ae6e268a9e2c0Virustotal results 35.48% Heodo
2020-01-31Inv_987_7581725.docdoc b55e345222e897164ac53450a97ec981ab339fcab0449d591a9c39b6d971888dVirustotal results 34.38% Heodo
2020-01-31Inv LQUD25_840446.docdoc ed5859306a9e6bd5508a498220dedddb4871dd6bbf6e8438a27a6f393822fd52Virustotal results 36.67% Heodo
2020-01-31invoice_XT159_4883102.docdoc 5cc9b80f9de781a2bc9717ed8ae9323422aeedca1df3e663869ed6a168f1986dVirustotal results 33.87% Heodo
2020-01-31invoice SNY68_63665476.docdoc 933fafacef72ddc88d72a24e9b8ccfdbef7cfff0a1e8ee8789e893e43ad6486fVirustotal results 39.06% Heodo
2020-01-31INVOICE-AAP0_088309.docdoc 1092c9cc1b0dbf643c81898c30d3034b4db59f49a86de85ced39a5315ce4549eVirustotal results 35.94% 
2020-01-30invoice-AE83_656440346.docdoc 228960ea68978d82cf8f245946c0522095c90c78bd4a188a620e87d306c2619aVirustotal results 34.43% Heodo
2020-01-30Inv-IM425_79607561.docdoc 8aa2f0d5d11a3aedd257f45c6768e0c8af5a1473436c6e956d5455494349ab8cVirustotal results 34.38% Heodo
2020-01-30Inv-QE25_332738.docdoc 707d9aa4ab42a23287c794da505c1f4aaca330a94a9a614ba307c0894f6233e5Virustotal results 30.16% 
2020-01-30invoice-CNSI488_518189461.docdoc 5452b9448c3310adaa86f6020c32d6ae4727fce5049f613ad9242e2f35e94effVirustotal results 33.33% Heodo