URLhaus Database

You are currently viewing the URLhaus database entry for http://novamiholdings.com/flash/vor32i-q15g-529661/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:420359
URL: http://novamiholdings.com/flash/vor32i-q15g-529661/
URL Status:Offline
Host: novamiholdings.com
Date added:2020-07-28 05:12:04 UTC
Last online:2020-07-28 11:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-07-28 05:14:02 UTC to abuse{at}ovh[dot]net)
Takedown time:6 hours, 44 minutes Good (down since 2020-07-28 11:58:08 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-07-28INVOICE RA196{:REGEX:.docdoc 8330eec3e5619dfe033c6d7059a8b53f1cd6319c5960f917d5b4472534fa349dVirustotal results 39.34%Heodo
2020-07-28INVOICE RA196{:REGEX:.docdoc 8330eec3e5619dfe033c6d7059a8b53f1cd6319c5960f917d5b4472534fa349dVirustotal results 39.34%Heodo
2020-07-28INVOICE-B2_7977801.docdoc 9b53e25c18550bb28f84e6697c4ad8a1024b50dd98073ba4d187c207aa3efacdVirustotal results 39.34% Heodo
2020-07-28Inv-OE486_85233022.docdoc 28511f631bf376ca915a3a1e51bca9515ae3b6e4577ea494758204b95000007bn/a Heodo
2020-07-28Inv M2301{:REGEX:.docdoc a94f8d3b4fe1a2990dd3bac5f9256d56b8fc49291c7fe4e5b9dff1ca9e04d00aVirustotal results 38.71% Heodo
2020-07-28INVOICE 499{:REGEX:.docdoc 1fded3892f4fe5d626ac2db13e3fa102887a58570ff4e24394e6eff607f980a5Virustotal results 40.00%Heodo
2020-07-28invoice-8580{:REGEX:.docdoc c006d3ae2670d993d05d0cd218a9538d9a86d7616a270ef3577ff939eb581418Virustotal results 38.71%Heodo
2020-07-28InvWMRV1738{:REGEX:.docdoc 8dc53b4ab73fa5da88a74de6b50ca2324e46f8e2ba19fea6ff7cdc642f1db3daVirustotal results 38.71% Heodo
2020-07-28INVOICE_2230_406510.docdoc 4fc696232ad4c1214d2b3d17bcf0f268ddab6901590133a86284fd475bffc038Virustotal results 37.10% Heodo
2020-07-28invoice KS00_868234.docdoc 4236db6ed17851f49948cf69c3982c76b722422e8753115efcf9c7093ad32cc7Virustotal results 37.70% Heodo
2020-07-28Invoice-F66_509444.docdoc efc93a4b32e611d4d72a3dea59ead7b779e734ab7ce5047f1b22804c11e2af3fVirustotal results 36.67% Heodo
2020-07-28Inv_QS4_98746476.docdoc d652244433caaa17c36aac28e633467530b4f4405da4280dc2ce54de0cee1f96Virustotal results 44.07%Heodo
2020-07-28Invoice-M8_213438.docdoc f2534ae2833ed6c74f9c54ca47615d65e00f1940a3eb77e2cd2dc6043d611f20Virustotal results 41.94% Heodo
2020-07-28INVOICE_PH6_717107931.docdoc 8e53e2be357739f0704628c21eb3d900cc35152a7e50065886f35864544c9f7bVirustotal results 42.62% Heodo