URLhaus Database

You are currently viewing the URLhaus database entry for http://196.251.107.24/v4343.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3794673
URL: http://196.251.107.24/v4343.exe
URL Status:flame Online (spreading malware for 18 days, 17 hours, 10 minutes)
Host: 196.251.107.24
Date added:2026-03-12 16:36:07 UTC
Threat:Malware download Malware download
Reporter: Bitsight
Abuse complaint sent (?): Yes (2026-03-12 16:37:11 UTC to abusepoc{at}afrinic[dot]net)
Tags:dropped-by-amadey fbf543 njRAT link QuasarRAT link Vidar link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2026-03-29v4343.exeexe 959cceef4f8294a4b950aa279840954d3568fb196736defd74a844897d15676an/anjrat
2026-03-29v4343.exeexe 255ee1019e2d5d84c20ab20b32a347989d2799d8039035b0047343d8c889d358n/a njrat
2026-03-28v4343.exeexe f7cee0d15b31a18623b4fbabfc79a1238199d1fc5fc0b293137ca1f3ae9e5c2dn/a njrat
2026-03-26v4343.exeexe 6888a1ed9538c4a3853728036d0ee154022d92083d95ca437679afb96511e616n/a Vidar
2026-03-20v4343.exeexe 47fe7c0696700c15908c042d9e1b94dc892855d04e3682a9abb09c7312140d0fn/a njrat
2026-03-14v4343.exeexe 45d920001496e846e5f28c755ef5d67f6a0b0f18a5690e6d6fb47a71f65b787en/aQuasarRAT
2026-03-12v4343.exeexe 279997c885d0624ed794d19abbe608b1601def6047ea0380112ca9a4efe33de1n/anjrat