URLhaus Database

You are currently viewing the URLhaus database entry for http://h-h-h.jp/wpp-app/files/US/DOC/Please-pull-invoice-40905/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:33180
URL: http://h-h-h.jp/wpp-app/files/US/DOC/Please-pull-invoice-40905/
URL Status:Offline
Host: h-h-h.jp
Date added:2018-07-17 00:27:51 UTC
Last online:2018-09-08 07:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2018-07-17 00:35:12 UTC to hostmaster{at}nic[dot]ad[dot]jp)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2018-07-18YD1678790_2018_07_18.docdoc c05cc99f1f1074183bd63f6af74e31b922dc20ba2f42bed3ee67e5eea031c353Virustotal results 20.34% Heodo
2018-07-18FTK46127413318_2018_07_18.docdoc 6f8e87bcf7b47f9176d33d485570336fbab97ff5ac8b3e37f18f068f8d15c6fdVirustotal results 21.67% Heodo
2018-07-18QX7006042686_2018_07_18.docdoc 8bfdf6fe5f6a3aab367939407088cab9cdc7215d1220770b5a857fe832d2ea02Virustotal results 22.41% Heodo
2018-07-18YNU5996592_2018_07_18.docdoc 4c9a2cf4a14ec7f975dde42fc42f79fa243c62b83ddef221a93d9b18c97b0f76Virustotal results 22.03% Heodo
2018-07-18DQ8785056_2018_07_18.docdoc 88e58c4c6d5082af96ac34dcb055a3e14aa178d96824adeece1d128d9c45dfb7Virustotal results 21.67% Heodo
2018-07-18FT9304610_2018_07_18.docdoc fb1a7b69d5aaab170c303978511a9fbb992d49e57479d413c3920f65336b5eb7n/a Heodo
2018-07-18INV-035-QO-519515/10.docdoc 3a1345bc72b9f4302bcaf3bab57fb37e1219e4e9a5b971c2d1943eea9dd08606Virustotal results 20.00% Heodo
2018-07-18INVOICE-05073759/9.docdoc e7db2087ef7f0f80640c7f62a493da43eadb8db5f5af90ef1cb55e68a465696aVirustotal results 46.67% Heodo
2018-07-17INV-09067227/1.docdoc 04f46cc8eea2154477cdfc3b893ae9f625e662cd401c3bd172dd9943e92032d4Virustotal results 22.81% Heodo
2018-07-17INVOICE-EQ-7394737.docdoc cd4341a7f34a2e518627f65f97684bf899835ed2015aaa8c1528851d1499e76eVirustotal results 23.73% Heodo
2018-07-17INVOICE-20180717-3362070.docdoc 1aab73556bab1809608aaf425a3fcedd78401d92a645c3956bdbcc62b91a60d8n/a Heodo
2018-07-17INVOICE-011-ET-588820/86.docdoc d834ed62585cd18e935256a902b4b9c4de81982c4a7818421aec87f374e091b7n/a Heodo
2018-07-17inv-2018-07-17.docdoc d12be5ad757cda0b161d7092be269ded5e05250ceedea0c0698ed6842656775fVirustotal results 19.30% Heodo
2018-07-17invoice-2018-07-17.docdoc a4c7d8e6eec7d4ebe9f100987d663dd1bfa89876395a933694d11c92b826ae3an/a Heodo
2018-07-17INV-20180717-85581169.docdoc 2670d65bc39dcae2b98b5e565a2e3085db9af28e3eb087870b0ce6c50ba72cf7Virustotal results 19.30% Heodo