URLhaus Database

You are currently viewing the URLhaus database entry for http://proxy.amazonscouts.com/yuop/66c08d2750ada_PilotEdit.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:3223290
URL: http://proxy.amazonscouts.com/yuop/66c08d2750ada_PilotEdit.exe
URL Status:Offline
Host: proxy.amazonscouts.com
Date added:2024-10-07 19:09:40 UTC
Last online:2024-10-22 16:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Status unknown
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: abus3reports
Abuse complaint sent (?): Yes (2024-10-07 19:10:16 UTC to karina-rashkovska{at}ukr[dot]net)
Takedown time:14 days, 21 hours, 35 minutes Bad (down since 2024-10-22 16:46:08 UTC)
Tags:GoInjector LummaStealer

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2024-10-21n/aexe 22c4614d712d71c43655ba456b05ca277d3da567d20337b6a9dad3fd1ac3c656n/a 
2024-10-17n/aexe b7e0ecfa99b98ef72edd368d484233456b0174180731de3b6ace299b32d289a6n/a GoInjector
2024-10-13n/aexe a42963c2892c0678ce1bd2d9a6a76ebc04a93aa3ce3e9257b75fa3312263d3d0n/a 
2024-10-11n/aexe e6071454d8598d40d65c4af20c577b6386e0817cacd69546d35a74389bf80401n/a 
2024-10-09n/aexe a8c883399cb6b722d72f796fb4c96fe7d9286a0f0ec7c4f7c62059c8ef4cc376n/a 
2024-10-07n/aexe c71ed9c894349306956a40c939056be8ae8c1991a55588517e771c819f1a174fVirustotal results 77.78%LummaStealer