URLhaus Database

You are currently viewing the URLhaus database entry for http://findrs.com.br/cgi-bin/FyWO/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:416289
URL: http://findrs.com.br/cgi-bin/FyWO/
URL Status:Offline
Host: findrs.com.br
Date added:2020-07-21 20:26:06 UTC
Last online:2020-08-06 02:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-07-21 20:28:02 UTC to abuse{at}locaweb[dot]com[dot]br)
Takedown time:15 days, 5 hours, 57 minutes Bad (down since 2020-08-06 02:25:58 UTC)
Tags:doc emotet link epoch3 heodo link ZLoader link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-02invoice JC2844_473457880.docdoc 18fe339a03b33e6b2fbe0b44287c1a8869d8b21af3ce76b437a1243ab5601102Virustotal results 67.74% 
2020-07-22invoice-AMFE7_111749554.docdoc a69ea13a804925a2c446c80a8a9ee6b20385313190c2a8f84083ee75dc3c961eVirustotal results 28.81% Heodo
2020-07-22INVOICE JQHN27_513425282.docdoc 36cd81d1e9f3def8eb7ab3012b360a09e3bc2c62bbe8ce0b138faacb34c4600eVirustotal results 30.00% 
2020-07-22INVOICE-EFVD5920_336135.docdoc 4ecc69d66a27fcded380c3d3d2efc6dad4189f789c784faeefa7bb8d4fea8c1bn/a Heodo
2020-07-22invoice RAS3_404818.docdoc 02c7fd8ed2ff395eb8c7eb3caca1e0cec299f4db7480e6d19829069ce541bc7dVirustotal results 27.42%ZLoader
2020-07-22Invoice_PPY98_619109.docdoc c679172a57262c3c69a11b8b2f0c2074c71f3a338be835c38c72557cefb2bc38n/a ZLoader
2020-07-22Inv_OQR63_281864270.docdoc 962dfcf9dbe2a5f4e39e1ad1100caa0da7d50a87928be0985eb4014a51f3ebc5Virustotal results 26.67% ZLoader
2020-07-22Inv-SIYU9231_948629489.docdoc eb7c02a2f5a7f9b6c76befb58faed0e6cba4cfc494eca22bd8e87b36fa241b66Virustotal results 27.12% 
2020-07-21Invoice_MZB3_8529163.docdoc 2bf992bac6895328fca415aeeee4f89aff347608e709524ad9a2f549b007dae3Virustotal results 26.67% ZLoader
2020-07-21Invoice-JZ082_754410652.docdoc 5a8f4a7b9da36a38084e054525e4d5d471070b15f958a1118eaea6f7be429767n/a ZLoader
2020-07-21Inv-S1_32959814.docdoc eac069c2098e2a08afb43c1f5aae5878d557e5cef94096cefa93bbe0d04c236bn/a 
2020-07-21Invoice-YTY7_4160546.docdoc 837bbc0f0c83b6a6837640d6ecda9c348ffd06a81fa4b87c7ebfc7df59b1a690Virustotal results 26.23% ZLoader
2020-07-21Invoice_QJLJ9_77314785.docdoc 3b634bd85f764e5bee577267f6127cc573c6ad191958e2bbed9bb7d581fcdda7Virustotal results 26.23% ZLoader
2020-07-21invoice WID3_336926761.docdoc 4525667af6f304e3f250547a62f381d49b1cf8610607e9c9fd63533deeb5f41an/a Heodo