URLhaus Database

You are currently viewing the URLhaus database entry for http://mail.consumers.com.ng/temp/4xi-coy-29240/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:417624
URL: http://mail.consumers.com.ng/temp/4xi-coy-29240/
URL Status:Offline
Host: mail.consumers.com.ng
Date added:2020-07-22 02:06:45 UTC
Last online:2020-07-22 10:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-07-22 02:08:10 UTC to admin{at}cloudcone[dot]com)
Takedown time:8 hours, 34 minutes Good (down since 2020-07-22 10:42:48 UTC)
Tags:doc emotet link epoch3 heodo link ZLoader link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-07-22Invoice_Q133_826020469.docdoc 4ecc69d66a27fcded380c3d3d2efc6dad4189f789c784faeefa7bb8d4fea8c1bn/a Heodo
2020-07-22INVOICE DTWS6512_4984396.docdoc 02c7fd8ed2ff395eb8c7eb3caca1e0cec299f4db7480e6d19829069ce541bc7dVirustotal results 27.42%ZLoader
2020-07-22Inv ET5808_565971217.docdoc c679172a57262c3c69a11b8b2f0c2074c71f3a338be835c38c72557cefb2bc38n/a ZLoader
2020-07-22INVOICE-TMFO280_7420340.docdoc 962dfcf9dbe2a5f4e39e1ad1100caa0da7d50a87928be0985eb4014a51f3ebc5Virustotal results 26.67% ZLoader
2020-07-22INVOICE_WIAW5163_849241.docdoc 4859caa197be70c49719788cc836b4ce719613e177ba187b99c0a293227b8011Virustotal results 27.12% ZLoader