URLhaus Database

You are currently viewing the URLhaus database entry for https://georgiawmscog.com/wp-admin/0pzp-gj-1143/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:303651
URL: https://georgiawmscog.com/wp-admin/0pzp-gj-1143/
URL Status:Offline
Host: georgiawmscog.com
Date added:2020-01-31 04:18:03 UTC
Last online:2020-02-03 04:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: spamhaus
Abuse complaint sent (?): Yes (2020-01-31 04:20:03 UTC to abuse{at}amazonaws[dot]com)
Takedown time:3 days, 0 hours, 2 minutes Bad (down since 2020-02-03 04:22:07 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-02-01Inv 9604_92759120.docdoc 970df6100d8375af169bb259df2c7bb1ad641294e34ed57dc3ad02a38371b4c7Virustotal results 36.51%Heodo
2020-02-01invoice QPX7613_864815032.docdoc b8293e1621d18a41ab502785bdf7c9db017b758601839425ee13e60cd88b9d47Virustotal results 35.94% 
2020-02-01Inv_A12_829854846.docdoc 068c0fa7ec2b72cc8c87bf99a725b7e44c8a49a5b8461358acd77d6186504229Virustotal results 35.94% Heodo
2020-01-31INVOICE_XDEE062_50298612.docdoc be8e29291f74f6e6d6af939a01b396322fc81f5fad594008c08b46d63f558057Virustotal results 36.51% Heodo
2020-01-31Inv 6_3790089.docdoc 66cf6a1cda9e240560d3dd09a638f88527ba60dc15d9d5716e63c8ad1df5e954Virustotal results 32.81% Heodo
2020-01-31Invoice 9559_218071.docdoc 3c898038b0729e908f29fc28f0b7b4032f71c1bc46d890ded09e2b435bb75256n/a 
2020-01-31Invoice-HUN51_744700385.docdoc 93f30df7007372c3e96246ac6e4f6aada7422dabc2cca1dce79322aa17715aa4Virustotal results 31.75% Heodo
2020-01-31INVOICE-FRQT5092_989160.docdoc bc79e24ba2ac5c6cfe39026ed82318cd18feb73fd5f8987ffcf5b7f9cdd9af0bVirustotal results 34.38% 
2020-01-31Inv 544_29467946.docdoc 897dc97e808c47688c5b3059d5f3c26eab575728e2cef883e6ddd8243b6912d9Virustotal results 33.33% Heodo
2020-01-31Inv-BQQT5305_82062025.docdoc 2041559b24b2289ef8263b1c8335bd87424dc62061a72b4bfdd5525b98da6b54Virustotal results 28.57% Heodo
2020-01-31invoice_LODN30_557687987.docdoc e01b9d1ec39ab6b746fab54011b045e107974f3d979db52766632eec495d9b59Virustotal results 33.33% Heodo
2020-01-31Inv Z28_95664927.docdoc a7b7c834a9ba78a0dc99c2464438070f71eaef06ee9c57af57b9b11c4b0e3b2bVirustotal results 20.31% Heodo
2020-01-31Inv-RU34_202995.docdoc cf5dba5032b0f5bb0d64f3622bfeb7e35d27c6892d6ba1daa6f07cae87b1566eVirustotal results 20.31% 
2020-01-31INVOICE-ONI4_420397682.docdoc 02d0fca16499272621f28342b9c41dfc3c6133eb9cc3d485b8334de09bc9825fVirustotal results 22.03% Heodo
2020-01-31invoice-73_756922.docdoc 322bc97effba52663f35f592be159313057162f0b75287845c440a3971648cb7n/a Heodo
2020-01-31INVOICE 74_3552257.docdoc e1fe6aa5e952e7f904ab79438277216f1af38d9073fa0f7656c8bbfec0ba6639Virustotal results 20.31% Heodo
2020-01-31invoice EV810_26779923.docdoc 1588ef587024ad7de73a0791fa28080025d2b56083263d8c9a597c2a4526ef1eVirustotal results 20.31% Heodo
2020-01-31invoice S058_853634088.docdoc 64fed04221b3089f9ca965d7265619bad9d87b2d65ce2f55c04e3f3f95c5db4dn/a Heodo
2020-01-31Invoice_LWL0854_273638703.docdoc 3787564ed34e427bb2a2d38b16eb007660f36dffcbb6a32b4f38768073b582feVirustotal results 20.31% 
2020-01-31INVOICE_ETN4_65427938.docdoc 605d7a3139166d8f5ef7e7c7acea745d2c208df433a07e161d991fd71275e763Virustotal results 34.92% 
2020-01-31Invoice-983_948981.docdoc ccddc6689a91146aede39e3377ab86137c9c192862ec3f11233259d86f9cc9ebVirustotal results 34.38% Heodo
2020-01-31invoice_RAWQ1_5662471.docdoc 89ac24049d91b7e2d6182935df119f822aa6b341294c2eca2d9b159a9da16fabVirustotal results 33.33% Heodo