URLhaus Database

You are currently viewing the URLhaus database entry for http://hccsouth.myap.co.za/wp-admin/TzJF/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:303428
URL: http://hccsouth.myap.co.za/wp-admin/TzJF/
URL Status:Offline
Host: hccsouth.myap.co.za
Date added:2020-01-30 23:26:04 UTC
Last online:2020-02-01 23:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-01-30 23:32:06 UTC to abusepoc{at}afrinic[dot]net)
Takedown time:2 days, 0 hours, 11 minutes Poor (down since 2020-02-01 23:44:05 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-02-01invoice-BT69_09606178.docdoc 970df6100d8375af169bb259df2c7bb1ad641294e34ed57dc3ad02a38371b4c7Virustotal results 36.51%Heodo
2020-02-01INVOICE-UBA484_424183465.docdoc b8293e1621d18a41ab502785bdf7c9db017b758601839425ee13e60cd88b9d47Virustotal results 35.94% 
2020-02-01Inv_BGPR06_13214257.docdoc 21cc5dc75e0eae0ad8fb9884493f83b13a97a90a01a24808a9df5c1751cb11e5Virustotal results 38.10% Heodo
2020-01-31INVOICE IXZ051_2361626.docdoc be8e29291f74f6e6d6af939a01b396322fc81f5fad594008c08b46d63f558057Virustotal results 36.51% Heodo
2020-01-31INVOICE-8639_72621212.docdoc 66cf6a1cda9e240560d3dd09a638f88527ba60dc15d9d5716e63c8ad1df5e954Virustotal results 32.81% Heodo
2020-01-31INVOICE_2654_716536490.docdoc df3b6aaa924ed3e9a2eba95dac5813980820281a3c2d6d6c1c91c0a0c5294ecfVirustotal results 31.75% Heodo
2020-01-31Invoice-6_230816527.docdoc 48aece09b58178b17b2a09cebbb26f2da0bc3e6140b65d86b642060ec00689e5Virustotal results 33.33% Heodo
2020-01-31Invoice_VXDW4068_7080774.docdoc 6badcc88b488e9d571a0fef444547d9dd353e3dcf9c6f9f11b660c9641e3178dn/a 
2020-01-31Invoice-GISD69_1898207.docdoc b777b2c1bf49b5a05bd8241ae61fbcfa3c3c96cd899ef9ff4215bc6121945da2Virustotal results 22.22% Heodo
2020-01-31Inv-1_29671689.docdoc a7b7c834a9ba78a0dc99c2464438070f71eaef06ee9c57af57b9b11c4b0e3b2bVirustotal results 20.31% Heodo
2020-01-31Inv-JF2_636165103.docdoc cf5dba5032b0f5bb0d64f3622bfeb7e35d27c6892d6ba1daa6f07cae87b1566eVirustotal results 20.31% 
2020-01-31invoice G3881_916056.docdoc 1fdae9fc6aa69ff362c050d3b72b7ea035f4347be47b332d1cf733a6a60ebf62Virustotal results 27.12% Heodo
2020-01-31invoice-OIRF090_2492292.docdoc 322bc97effba52663f35f592be159313057162f0b75287845c440a3971648cb7n/a Heodo
2020-01-31Invoice-ICV937_783147.docdoc 21b6e7719a2afa773453d60937aa333af8e41f515ecf2f2f50301c235971e447n/a Heodo
2020-01-31INVOICE_MSHI9183_76814289.docdoc 3787564ed34e427bb2a2d38b16eb007660f36dffcbb6a32b4f38768073b582feVirustotal results 20.31% 
2020-01-31invoice WQEG0523_4161400.docdoc 68338a3e8777d1f7b2d7e8a7a5235a01194c8219503bb5a16ec83d01aeb5ce37Virustotal results 34.92% 
2020-01-30INVOICE-TRFO6_24436902.docdoc c8c286255f467caa7eb0f54b97f1acc2630a2a61dbbde4625adcdd4537d51c80n/a Heodo