URLhaus Database

You are currently viewing the URLhaus database entry for http://cm2.com.br/files/US/STATUS/Invoice which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:33039
URL: http://cm2.com.br/files/US/STATUS/Invoice
URL Status:Offline
Host: cm2.com.br
Date added:2018-07-16 20:29:14 UTC
Last online:2019-12-19 06:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Blocked
DNS4EU :Not blocked
Reporter:Anonymous
Abuse complaint sent (?): Yes (2018-08-05 08:30:02 UTC to root{at}localhost)
Tags:doc emotet link heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2019-11-30n/ahtml 0ab227eef05588fcc147ae4eb2b25cbf8819c977eebcc5134ccecfe42c79a234Virustotal results 0.00% 
2018-07-18IV85375858599_2018_07_18.docdoc 8bfdf6fe5f6a3aab367939407088cab9cdc7215d1220770b5a857fe832d2ea02Virustotal results 22.41% Heodo
2018-07-18PCO0411860_2018_07_18.docdoc 11b477af5969654685b2b2854bc111a009f5b2a5e6df11fa043545a3b9e35a5dn/a Heodo
2018-07-18XXO93709073731_2018_07_18.docdoc ef1dcdc1d066585352fb6d08ff608a610fd9cac47788f58b988f2ac63ba26947Virustotal results 22.03% Heodo
2018-07-18DK8939505_2018_07_18.docdoc 88e58c4c6d5082af96ac34dcb055a3e14aa178d96824adeece1d128d9c45dfb7Virustotal results 21.67% Heodo
2018-07-18ER990200169_2018_07_18.docdoc fb1a7b69d5aaab170c303978511a9fbb992d49e57479d413c3920f65336b5eb7n/a Heodo
2018-07-18INV-0452644/04.docdoc 9fb50688d1bc150a10e2551285e7378d511b4202aec7c45ed3885ad0ec0f7c45n/a Heodo
2018-07-18INV-0477711/6.docdoc 29f1e37901181049c11b09ff12011b02fe3a7e0ea73941bd4a75da8aed7d3d4bVirustotal results 18.97% Heodo
2018-07-18inv-027-O-780510/53.docdoc e7db2087ef7f0f80640c7f62a493da43eadb8db5f5af90ef1cb55e68a465696aVirustotal results 46.67% Heodo
2018-07-17inv-20180717-877375.docdoc cd4341a7f34a2e518627f65f97684bf899835ed2015aaa8c1528851d1499e76eVirustotal results 23.73% Heodo
2018-07-17INV-09-XJC-5499961/35.docdoc 1aab73556bab1809608aaf425a3fcedd78401d92a645c3956bdbcc62b91a60d8Virustotal results 21.67% Heodo
2018-07-17inv-2018-07-17.docdoc d834ed62585cd18e935256a902b4b9c4de81982c4a7818421aec87f374e091b7n/a Heodo
2018-07-17inv-2018-07-17.docdoc 5392f1f8bfb6e7028ce3867954cc096635188bb78c5f86506fbc6b4adfc274d8Virustotal results 20.34% Heodo
2018-07-17invoice-07-ZC-886258/26.docdoc a4c7d8e6eec7d4ebe9f100987d663dd1bfa89876395a933694d11c92b826ae3an/a Heodo
2018-07-17invoice-072-MCH-812837/702.docdoc 16d90ae2f5746b49fb757329d6994a501dee047fa826419932ff604dfafe179aVirustotal results 18.64% Heodo
2018-07-16INV-DW-248296.docdoc 5fffbc185d86b50f00620644c6f252726f3db0d91191b03d31c1d3c0eb8ed4cfVirustotal results 15.79% Heodo