URLhaus Database

You are currently viewing the URLhaus database entry for http://bagiennanarew.pl/plugins/Zahlungsschreiben/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:30952
URL: http://bagiennanarew.pl/plugins/Zahlungsschreiben/
URL Status:Offline
Host: bagiennanarew.pl
Date added:2018-07-11 19:55:09 UTC
Last online:2018-09-08 07:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Not blocked
OpenBLD :Blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2018-07-11 20:01:46 UTC to abuse{at}plus[dot]pl)
Tags:doc emotet link epoch1 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2018-07-15RECH-ZXQO-0290-64952.docdoc cc8488664a29faf1bb440244582a8bc0ed936f339ff308008993f0c95e2ad8bbVirustotal results 45.00% Heodo
2018-07-12RE-JHQ-4754460/589.docdoc fdde7abab08bd9f065526c49a3b8f0a9174a3c2b0d7fef85ac23431e5899d4aen/a Heodo
2018-07-12RECH-ZS-412925348.docdoc 99019a62983f3c18e3c81f4ebdbe87233c8396fcd3b6a18465b080afa88a8db5Virustotal results 27.12% Heodo
2018-07-12RG-OOK-2854986/619.docdoc c1099ff707e0bc5dc00a8f706e389c2691611ca8245cf3a33a9ea52c2af318ebn/a Heodo
2018-07-12RE-QXC-01079-50415.docdoc 5877bb6f3f98aa49af576cfcd1aeefbd720a33adfa81166778e426383e712caaVirustotal results 25.00% Heodo
2018-07-12RG-PUAB-6730835/6.docdoc f3453f385b807f09354571612940dfd6903fdd5a357d08571bac5804590fb15bVirustotal results 25.00% Heodo
2018-07-12RECH-DR-35026774.docdoc a8a1e39f215f3b22e55d47a48e99e5af438224f789d91ab6a26c662658184e5bVirustotal results 22.41% Heodo
2018-07-12RECH-GPFK-8747319/7.docdoc 5b4449ef5bbd959a6a379887fbed5de4d4174076728de527b52c08abdb2b915dVirustotal results 26.67% Heodo
2018-07-12RE-ZKDR-96163105/54.docdoc 1a5eaa3b8261f0a77136d36fc1f93e9df5a4cb982b68ed8419ec23c06b961270Virustotal results 23.73% Heodo
2018-07-12RE-MW-7817080/630.docdoc 4eb0d01901137010c5b3a4a3af567f13458b36b7022799c8d18d4eb3cef221d3Virustotal results 23.73% Heodo
2018-07-12RE-NZY-44190705.docdoc 04384ba7dd7282a70dcd80f935b52b7849e98665187b1289a1d580068ade624bVirustotal results 23.73% Heodo
2018-07-12RE-PPT-501916142/55.docdoc b6fd9a12ecd1c88e02434e30139ad60db956b1a856276a3c6400195ae4af5c20Virustotal results 20.34% Heodo
2018-07-11RECH-WSY-008031102-7.docdoc 3cd0c01c667d483fbea1bd49ffcda292773ac2b3d3700ebadfb4a69fe97be055Virustotal results 16.95% Heodo
2018-07-11Rechnung-SQ-039124659-3.docdoc 0f5327d52b6cf5ea3f32d2ed2d61dab0d8cc1de484f86c9dfaa2ab10ca6e5516Virustotal results 16.95% Heodo
2018-07-11rech-ADR-05-9978837.docdoc bf11da233209158807d26436618223c12150340ea118de1be2b3df20d73b93f3Virustotal results 16.67% Heodo