URLhaus Database

You are currently viewing the URLhaus database entry for http://migmon.club/kyo1.exe which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:411799
URL: http://migmon.club/kyo1.exe
URL Status:Offline
Host: migmon.club
Date added:2020-07-11 07:31:10 UTC
Last online:2020-07-20 11:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: theDark3d
Abuse complaint sent (?): Yes (2020-07-11 07:32:04 UTC to abuse{at}server-panel[dot]net)
Takedown time:9 days, 3 hours, 49 minutes Bad (down since 2020-07-20 11:21:53 UTC)
Tags:ArkeiStealer link malware RedLineStealer link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-07-18n/aexe edfbec2a06fba59849e38d2c69e9d05be3d0f381eec021f20d42f27095a6358bVirustotal results 29.17% 
2020-07-17n/aexe c79a3bd6b7a37c9bf58d12a6c493e00df8413d6b68892f8c402fb34a8341aa5bn/a 
2020-07-17n/aexe 117b571a9e73c76c1b328cd9c24decdbb92faaf6c57368e6e07b40fb3f6105d0n/a 
2020-07-17n/aexe 0364bc29c9f6adbcbc56f550c818629c897a530ccc7dc1ea45d849096054faf2Virustotal results 24.66% 
2020-07-16n/aexe 65292fc83d0f68c0355d1bc5135941bab15c347868d830dc0a51d26dbf507e7cn/a 
2020-07-15n/aexe fbd2ff34ae34c606839e77ef849c3bddcb7d84f8c4eaa93f286ec29ae8d4683dn/a 
2020-07-15n/aexe 98cef65471f42aa6bf548100eded72295a547357c0dbd1d22cc02cc9eb3402f4n/a 
2020-07-14n/aexe c2c32723777f11a1f034ea25e05eb7cc493e4c132e337c5f5ba678a9b4dd6ff7Virustotal results 27.40% 
2020-07-14n/aexe 56ffa743c3ad6152375bfd41b0ef590402a7dc6a22f3b072d42dd97c77b71b00n/a RedLineStealer
2020-07-14n/aexe d1cf6edc0a27e9eadabbaacd1ec9650d6484f91556c5e81ed3b43923c4dfc1d0n/a 
2020-07-13n/aexe 1e47d5a52e60004bb6a597f4d8bfd380deb8c6d1730570d58506260360ed4a0cn/a 
2020-07-13n/aexe d0e642197915ade19fb4c2df299063e49ed7f650e4b3b6ee90d4f0d626b900c3n/aRedLineStealer
2020-07-11n/aexe 3b9f555888df6326a6a0c7dd2c2c1c2d78bbb969c1b7d40ea0d0e9679a06bbc5n/aArkeiStealer
2020-07-11n/aexe 32c17a6caeed78f79e06de58d5229927f77bc8c6b4865b41289d4da886a07df4n/a