URLhaus Database

You are currently viewing the URLhaus database entry for https://rhema.com.sg/cgi-bin/rh-kutq-28/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:420363
URL: https://rhema.com.sg/cgi-bin/rh-kutq-28/
URL Status:Offline
Host: rhema.com.sg
Date added:2020-07-28 05:18:17 UTC
Last online:2020-07-28 17:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-07-28 05:20:03 UTC to abuse{at}exabytes[dot]sg)
Takedown time:12 hours, 1 minutes Good (down since 2020-07-28 17:21:22 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-07-28invoice-CM6046 61480887.docdoc 54171a3ad4b125dc2795767c4e783e474bddf5f973b21bfaad94b3d15057b763n/a Heodo
2020-07-28Invoice VO5750 913003357.docdoc 814e3bf4e6588ecf751e5808d868435ef992cf6b301d534341fb90d254f91cfeVirustotal results 39.34% Heodo
2020-07-28INVOICE 3-20275310.docdoc 8330eec3e5619dfe033c6d7059a8b53f1cd6319c5960f917d5b4472534fa349dVirustotal results 39.34%Heodo
2020-07-28invoice JZL1-7133874.docdoc 0e447707a2cdeef876e102f3abda24f1258292d7396aa4578f55049feb5bda64Virustotal results 38.71% Heodo
2020-07-28Invoice_B9163-027246.docdoc 5a1b1395bb79c4317f775809aca06f12d3425e60f4bd5b00770264fcd61ddab0Virustotal results 40.68% Heodo
2020-07-28Invoice-OFU34-1264390.docdoc a94f8d3b4fe1a2990dd3bac5f9256d56b8fc49291c7fe4e5b9dff1ca9e04d00aVirustotal results 38.71% Heodo
2020-07-28invoice VX721-770863.docdoc f46d788a226b81e595095da17c33bfb2df251ae91ea87860b3520bf65fb825e0n/a Heodo
2020-07-28InvoiceCDYO475{:REGEX:.docdoc c006d3ae2670d993d05d0cd218a9538d9a86d7616a270ef3577ff939eb581418Virustotal results 38.71%Heodo
2020-07-28INVOICE 5588 20562609.docdoc 0f7a1a362551fbf90a3548715a9bb55797d626eaba554963fb8a15a4fe5f0aa1n/a Heodo
2020-07-28invoice_FZK8074_4930111.docdoc 65b47a1844f8fb3d6c8b38241ae4145b15d14bf8e0af45b22b37bf18541a6d3cn/a Heodo
2020-07-28Inv-B935_892678340.docdoc a28309546b80d9907ee46705e00deb3d85098104e09a67a53bc44b570e78b49aVirustotal results 38.33% Heodo
2020-07-28invoice_AOHG0_22801581.docdoc efc93a4b32e611d4d72a3dea59ead7b779e734ab7ce5047f1b22804c11e2af3fVirustotal results 36.67% Heodo
2020-07-28Inv_IY542_8200000.docdoc d652244433caaa17c36aac28e633467530b4f4405da4280dc2ce54de0cee1f96Virustotal results 47.46%Heodo
2020-07-28Invoice-W3_299571392.docdoc 0d39f230923320beb88f5bdeda5a7e91fa8120c2075accf63923d2f841c08417n/a Heodo
2020-07-28INVOICE_22_512059.docdoc 3c55a57713d1ba096109507af046d6d13e7ba7bd1827479d8c852e9d79e068dfn/a Heodo