URLhaus Database

You are currently viewing the URLhaus database entry for http://www.ceo.org.my/pdf/En_us/Available-invoices/INV73514058979416279555/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:36126
URL:http://www.ceo.org.my/pdf/En_us/Available-invoices/INV73514058979416279555/
URL Status:Offline
Host:www.ceo.org.my
Date added:2018-07-26 03:57:40 UTC
Threat:Malware download Malware download
Google Safe Browsing:Clean
Spamhaus DBL:Not listed
SURBL:Not listed
Reporter:@JRoosen
Abuse complaint sent (?): Yes (2018-07-26 04:16:48 UTC to abuse{at}cloudflare[dot]com)
Tags:doc emotet epoch2 heodo

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTSignature
2018-07-26BR8874179602148.docdoc056a4134212e57a50932041c6294b4b2ede287d700a2a0512136eacc155e64b5Virustotal results 20 / 58 (34.48)Heodo