URLhaus Database

You are currently viewing the URLhaus database entry for https://www.plusjop.nl/media/apawf-fb-064/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:303032
URL: https://www.plusjop.nl/media/apawf-fb-064/
URL Status:Offline
Host: www.plusjop.nl
Date added:2020-01-30 16:03:09 UTC
Last online:2020-01-31 08:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-01-30 16:04:07 UTC to abuse{at}transip[dot]nl)
Takedown time:16 hours, 53 minutes Good (down since 2020-01-31 08:57:32 UTC)
Tags:doc emotet link epoch3 GandCrab link heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-01-31invoice_023_12090059.docdoc 02d0fca16499272621f28342b9c41dfc3c6133eb9cc3d485b8334de09bc9825fVirustotal results 22.03% Heodo
2020-01-31Inv LUWR33_128915.docdoc 605d7a3139166d8f5ef7e7c7acea745d2c208df433a07e161d991fd71275e763Virustotal results 34.92% 
2020-01-31Invoice MXUU2239_50653875.docdoc ccddc6689a91146aede39e3377ab86137c9c192862ec3f11233259d86f9cc9ebVirustotal results 34.38% Heodo
2020-01-31Inv-5447_345987.docdoc 8a06475b5843111147926b32b1aecdad3780400157cfae38379d64a78b36139fVirustotal results 33.87% Heodo
2020-01-31invoice-PUWY373_0890123.docdoc 68338a3e8777d1f7b2d7e8a7a5235a01194c8219503bb5a16ec83d01aeb5ce37Virustotal results 34.92% 
2020-01-31invoice-OQL0052_8285432.docdoc 1c2d2dcc9e0140fd9e9055a697ec4c2c969590ba93a2f5ebf75bde37cc7ba0f1Virustotal results 33.87% 
2020-01-31invoice_PIU0_584528.docdoc c685281700e3fdb853f1147f9679f260b4d9890730e02fdaf9f81b17759cc4c4Virustotal results 36.51% 
2020-01-30INVOICE-7_2071848.docdoc b93c176b25e95c8538cc6e80bf1dca7b57ab9a7fe306415caed9989f1c306dd3Virustotal results 33.87% Ransomware.GandCrab
2020-01-30Invoice-67_202386.docdoc 344ec62beaa38421243bae13fa80d39d7457a5c8a11c3347366c3e638d1326e0Virustotal results 33.87% Heodo
2020-01-30Invoice_9_34433504.docdoc 18679279d06463ba2ca553b32ba509a6cb62381bda5381ab82d862beb91da074Virustotal results 34.92% 
2020-01-30INVOICE_BI1822_379365293.docdoc 0cd2361c959ed9e7e67f305e10241dac8c04cf6aa8816a02fa0ecd57f3b8e66en/a 
2020-01-30Invoice-JX44_660876.docdoc 2e05dae96f07956982b9edba6d64d8668b4ff90f56d548ce2ef2feee40a6e6d5Virustotal results 39.06% Heodo
2020-01-30invoice-NG3387_053591.docdoc 55f4b1324dcf648c873b70518a37777563890c60c108b2a3eb40eaa7f5f2f90cn/a 
2020-01-30Inv-VED39_533876.docdoc 444380961c88bf398e9078529bf648cf7f4cc69a583fea9d036c4427e533d8c5n/a Heodo
2020-01-30Invoice-PJY70_573342715.docdoc 6f84027b87fb0b7ae0e5a8774946a8885cdacece0e71b3bc55e0085582c42611n/a Heodo