URLhaus Database

You are currently viewing the URLhaus database entry for http://flyfox.de/cgi-bin/2O64974xq0518072/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:418611
URL: http://flyfox.de/cgi-bin/2O64974xq0518072/
URL Status:Offline
Host: flyfox.de
Date added:2020-07-23 19:59:16 UTC
Last online:2020-07-23 20:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-07-23 20:00:06 UTC to abuse{at}strato[dot]de)
Takedown time:57 minutes Wow (down since 2020-07-23 20:57:38 UTC)
Tags:emotet link epoch3 exe heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-07-23rresbeiy4.exeexe 9592536100854889dfcd1207bae5b797552d99185c53a236f9565a2d72205c05n/a Heodo
2020-07-239a0359018050.exeexe 62c3a5d917569d9fd128bf7457ffae0bc19e9154c4a692f82a95f5602a259427n/a Heodo
2020-07-23femf0612.exeexe b00f127e3541274f15b175187fd4b0795c7802a3c800a5b66e2d9099b1f8a1c2n/a Heodo
2020-07-23luj2067ke359.exeexe e03422084793ada006a78aefeb65288202a9125f60f504321b4999588cda1534n/a Heodo
2020-07-232no1rmb73b48848582.exeexe 1cf6e719d6cc08b3c0cfad8775cdef002662d5737efac3982b30ad7f56abb947n/a Heodo