URLhaus Database

You are currently viewing the URLhaus database entry for http://dorsa.cloudsite.ir/eyku/invoice/jb3x624q/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:310598
URL: http://dorsa.cloudsite.ir/eyku/invoice/jb3x624q/
URL Status:Offline
Host: dorsa.cloudsite.ir
Date added:2020-02-07 02:02:38 UTC
Last online:2020-02-10 13:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-02-07 02:04:03 UTC to report{at}bitcommand[dot]com)
Takedown time:3 days, 11 hours, 22 minutes Bad (down since 2020-02-10 13:26:23 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-02-08W_UH0566481536XM.docdoc dd9d6397f31eccd414eb5605fdb0c1326d0c896f3ca781dc694d9584605a776cVirustotal results 43.33%Heodo
2020-02-0700816892.docdoc e5277ac135e8d4529cb33080106cbeefa46b1fa097049821880152ef7fb94bf3n/a 
2020-02-07INV_482406546281161694211118.docdoc f3bf2d1040fd94b083f175a3247847d464391cede07ad3c277b74042378378dbVirustotal results 39.34% 
2020-02-07REP_OPWN7BPAJRROHZ.docdoc 3ddcde61df1fa88f1373824a2bc0fa1a35f72f1d9bcdaa0fe5df0b60b3111f94Virustotal results 35.48% Heodo
2020-02-07REP_BJD_020120_XUG_020720.docdoc 1c6d631c09d300f142364ae0b2fe55324fe282376fe80b515cd0564aea45ee17Virustotal results 35.48% Heodo
2020-02-07DOC_UY8733923130FX.docdoc b1d7b40258d9992759f67e3bd54fbb74a2f49734944fd6552c8fb10dcd967adbVirustotal results 34.43% Heodo
2020-02-07GEV_020120_ZEQ_020720.docdoc 5b2e0aad15e47a95f777c95ba0f0c30c134ba9feb20bc8c9a2a6835cb415118bn/a Heodo
2020-02-07FHN_RUY_020120_GDW_020720.docdoc f634bf3b2d64827647f36c08ff9852864794cf339a24d505139da09ccd2cbc3an/a Heodo
2020-02-07DOC_TWA_020120_BZD_020720.docdoc 37df1c897498e12038bca3c4ae4d02776ab77d84a6e33bac3593b15667f858b4n/a Heodo
2020-02-07DOC_81561571.docdoc 11a6e77eee5d6eedee0f8dfc509d2235e240a806050f82c6646c2c97cd90f042n/a 
2020-02-07BAL_WD7087829314UL.docdoc 38d35c3ce7847fbdc46444e68d329f40ddfaabd79b5ae393024503136e835235Virustotal results 26.23% Heodo
2020-02-07EM_15151070752077156522503.docdoc 2fe76abca5995c9bfdd4a726e3a99a6122267c4e2e75f0b2e8a0a53e328c4c75Virustotal results 24.59% Heodo
2020-02-07BAL_49521121334383.docdoc b45c08762fa4e61a344aaf2010d2d89e76fe12e0f4366b93d0c527263b4d37ffVirustotal results 24.59% Heodo
2020-02-07INV_EV2701389172TT.docdoc 564fdd9d6bf50438b6642e414eeb140756f6e7f88f5227b1ce2e7854ca8f0615n/a Heodo
2020-02-07Q_40433688.docdoc bae76f0535d298ee180ae1afcde788e07fbc69254702d81e24556c576fb53102Virustotal results 25.81% 
2020-02-07Q_PO_02072020EX.docdoc a42b1cf33d6aa83bb05db0d047d0309a3428379bd5c0e4e08feb3eee0f0c1cefn/a Heodo
2020-02-07W_95335131.docdoc d1aec2c932ccb8c1d6e275256890a1a44eb8dc9af106ce80f38facfe3f446208Virustotal results 44.26% Heodo
2020-02-07BAL_0644028384559417282306412.docdoc b9d51444593ce2037bf83780d7be9cd3473bb96911f8c4c0aa84e5ab578a6c9fVirustotal results 37.29% Heodo
2020-02-0795273626.docdoc 416f9cd5c761a59ea746b7ef93ec7b96ad7885cfe9f1684f82727461041da87aVirustotal results 42.62% 
2020-02-07FILE_PER_020120_RSG_020720.docdoc c2c43cecad58956c714061de73f5f27bc7b2094cf1457b707070e0a54b3b50b5Virustotal results 33.87% 
2020-02-07FILE_61120201.docdoc 4df918d1053fd26c433888ce6f97fde9143050ddfc0e38a088270c9bc782ff18Virustotal results 32.26% Heodo