URLhaus Database

You are currently viewing the URLhaus database entry for https://studeraplus.com/blog/YPi/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:420368
URL: https://studeraplus.com/blog/YPi/
URL Status:Offline
Host: studeraplus.com
Date added:2020-07-28 05:19:04 UTC
Last online:2020-07-28 14:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-07-28 05:20:05 UTC to admin{at}frantech[dot]ca,fdias{at}frantech[dot]ca)
Takedown time:9 hours, 37 minutes Good (down since 2020-07-28 14:57:10 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-07-28invoice-MAVC5_93021854.docdoc 54171a3ad4b125dc2795767c4e783e474bddf5f973b21bfaad94b3d15057b763Virustotal results 41.67% Heodo
2020-07-28Invoice ZM6214{:REGEX:.docdoc 0034fc70978e5e2fbd485351d863a0f1f6eb072e56cf5eac63df39bd8aa5bf40n/a Heodo
2020-07-28Invoice L5764-093098.docdoc 814e3bf4e6588ecf751e5808d868435ef992cf6b301d534341fb90d254f91cfeVirustotal results 39.34% Heodo
2020-07-28Inv_IFZA26 73303653.docdoc 8330eec3e5619dfe033c6d7059a8b53f1cd6319c5960f917d5b4472534fa349dVirustotal results 39.34%Heodo
2020-07-28invoice-T2_14881110.docdoc 9b53e25c18550bb28f84e6697c4ad8a1024b50dd98073ba4d187c207aa3efacdVirustotal results 39.34% Heodo
2020-07-28INVOICE 7400-532453623.docdoc 28511f631bf376ca915a3a1e51bca9515ae3b6e4577ea494758204b95000007bn/a Heodo
2020-07-28INVOICE-HO6{:REGEX:.docdoc a94f8d3b4fe1a2990dd3bac5f9256d56b8fc49291c7fe4e5b9dff1ca9e04d00aVirustotal results 38.71% Heodo
2020-07-28Inv-1 671229.docdoc 1fded3892f4fe5d626ac2db13e3fa102887a58570ff4e24394e6eff607f980a5Virustotal results 40.00%Heodo
2020-07-28Inv-GOX6769 77648450.docdoc c006d3ae2670d993d05d0cd218a9538d9a86d7616a270ef3577ff939eb581418Virustotal results 38.71%Heodo
2020-07-28InvAGOK190-440065.docdoc 8dc53b4ab73fa5da88a74de6b50ca2324e46f8e2ba19fea6ff7cdc642f1db3daVirustotal results 38.71% Heodo
2020-07-28invoice-WORM0245_547152.docdoc 4fc696232ad4c1214d2b3d17bcf0f268ddab6901590133a86284fd475bffc038Virustotal results 37.10% Heodo
2020-07-28Inv 62_663496.docdoc 35f182246a6245227b09f3f93802700efb8a0ca75d89922a7f8ec04f38d1ba05n/a Heodo
2020-07-28Invoice-969_3789002.docdoc 9850f2cd940043ac7adb6b01af7095aa95a510c7b363a69dbc6eaab8b44c2444Virustotal results 37.70% Heodo
2020-07-28invoice_UG1712_504603253.docdoc a644b61aea4e67fa295d3966ece9fd43e79e99047dd804a9d2e2e538c0711071n/a Heodo
2020-07-28Inv_QIFS9_047574.docdoc d652244433caaa17c36aac28e633467530b4f4405da4280dc2ce54de0cee1f96Virustotal results 44.07%Heodo
2020-07-28invoice-OE5_4454767.docdoc 0d39f230923320beb88f5bdeda5a7e91fa8120c2075accf63923d2f841c08417n/a Heodo
2020-07-28Inv_S8076_2755582.docdoc fd4d62adbd04d2113e7ae2d0665a9818f0d7d917d81b4cbb2b3fe9cb1c57a9e5Virustotal results 40.98% Heodo