URLhaus Database

You are currently viewing the URLhaus database entry for http://hans.uniformeslaamistad.com/yuop/66c08d2750ada_PilotEdit.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:3211412
URL: http://hans.uniformeslaamistad.com/yuop/66c08d2750ada_PilotEdit.exe
URL Status:Offline
Host: hans.uniformeslaamistad.com
Date added:2024-10-04 18:49:57 UTC
Last online:2024-10-22 16:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: abus3reports
Abuse complaint sent (?): Yes (2024-10-04 18:52:09 UTC to karina-rashkovska{at}ukr[dot]net)
Takedown time:17 days, 21 hours, 21 minutes Bad (down since 2024-10-22 16:13:11 UTC)
Tags:exe GoInjector LummaStealer

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2024-10-21n/aexe 41807901ba61bb70b2bb9100fef542f0eee8fead43762f5309ab592acc38b559n/a 
2024-10-18n/aexe a8c9ae0f4f7b4c5397b0cf63cd7bf839420f77ea1907cfeb5892c6a941ee19bcn/a 
2024-10-18n/aexe c01cba2baf9208294a1a41ebdcfb80ed376dd72be94f697bd4d6c45fc5da88f2n/a GoInjector
2024-10-18n/aexe 0210ba734a9ab6e4df7564d01dcf680c347f0a73cfc33faee8bea633fbe0ec93n/a 
2024-10-16n/aexe 54a71ecb06d968e954e89c98add7b636f0a3cdf498f6df4fee8f775c9ee15115n/a 
2024-10-07n/aexe 1e6798fefc36924bfd1f7ea7566fd8d7475ed947a2a55d761753cd413e0497b5n/a 
2024-10-04n/aexe c71ed9c894349306956a40c939056be8ae8c1991a55588517e771c819f1a174fVirustotal results 77.78%LummaStealer