URLhaus Database

You are currently viewing the URLhaus database entry for http://www.gammatron.com.au/ajd/invoice/mpze2u9/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:421812
URL: http://www.gammatron.com.au/ajd/invoice/mpze2u9/
URL Status:Offline
Host: www.gammatron.com.au
Date added:2020-07-30 07:30:36 UTC
Last online:2020-08-13 23:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: zbetcheckin
Abuse complaint sent (?): Yes (2020-07-30 07:32:02 UTC to abuse{at}dreamscapenetworks[dot]com)
Takedown time:14 days, 16 hours, 22 minutes Bad (down since 2020-08-13 23:54:11 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-07-30FILE_17982537650927.docdoc d7fc0bd705c8bb068e089f65cb99df94a4e05efacc112e50b9e2408396341ad5Virustotal results 45.00%Heodo
2020-07-30U_OVJ_070120_KKC_073020.docdoc e44fc7d94a825e4d43a775fa247ddca6f4f8593e3605289e79eb4a8210025864Virustotal results 43.33%Heodo
2020-07-30BAL_88988014.docdoc 1460e8d0ac636b3af0e01a282bd5be1286d0b25f0d7f003bb770aad9980dae20n/a Heodo
2020-07-30DOC_8385261276306009684421.docdoc bae631a4bcfb6f64cb01a26d307ddcfa85d0d63f8765a7020242e2e5b7ba979eVirustotal results 45.00% Heodo
2020-07-30T_NK2121059580RY.docdoc fc71240699d99fe12f5253034d018233aca29f28291d562f41f75444f6ece914Virustotal results 45.00% Heodo
2020-07-30DOC_13693204.docdoc fc7484c50c216c229bc56f1a30be53166091175d16fd5c67ee9100e89500aae6Virustotal results 46.67% Heodo
2020-07-30FILE_PO_07302020EX.docdoc ae433920b47d1f5005e907e2c2d7186ccff63c77cd7c2adca9c6af59835d9b3aVirustotal results 45.00% Heodo
2020-07-30FILE_WK7466054376RO.docdoc 6aa4e9c3c4781ed46696242e2689be2ed5c4034163d662f303b4b560b27df651Virustotal results 44.26% Heodo
2020-07-30I_KNY_070120_YYE_073020.docdoc bc5d38b7165644157ba958af3bdec370f11c8d2d63a5f3c5471b9ee414f11db0n/a Heodo
2020-07-30FILE_PO_07302020EX.docdoc 5aca4b2c9a231b560e0375a292defe35147afbfd61d77863c69ae2b1bfb1d544n/aHeodo
2020-07-30DOC_OE8361867988NH.docdoc 7f808ac67ce1cd2c1e08a46de2537e6471f4ae05aaf7f61d3d21091745adad9aVirustotal results 42.62% Heodo
2020-07-30FILE_THL_070120_SFU_073020.docdoc 4e19a40400b659e85d29579ef73d26b68f233b36c95955e2133c2d7f11e6eb3dn/aHeodo
2020-07-30BAL_13051686.docdoc ccffd1057a0198494234050b71333c4cb0411d6c9fb3fdb730043076797c6fbcn/a Heodo
2020-07-30BAL_UX3275699589FY.docdoc c339ede6e08cef35a2de6c05bc44080a8944c3c0e50339ae6d2b06ff62228271Virustotal results 40.68%Heodo
2020-07-30FILE_24191435105699504.docdoc 07e19f3c256981e488d086f48552ee93a5b7d9148744edc670f477090ecfd5fcn/aHeodo
2020-07-30WZY_070120_EOJ_073020.docdoc f69221bcda2041011a5346b30da22aac2af5ed52c961455f6529339faa519dbcVirustotal results 40.98% Heodo
2020-07-30HW9509718954OO.docdoc 7023473bd49fc5fa0d5cb0b76e28ce6fffac4baaadca22f044fd05dd1a4785d7Virustotal results 41.67% Heodo
2020-07-30M_DM4556611826WK.docdoc 2fa814dd0c5fd6baf41a1dff861eee948734721c6155c4812ca40945d7432a07n/aHeodo
2020-07-30PO_07302020EX.docdoc fd2c870bab01edcb6af885cc070a9ededf595bb1b3613b83fb9313a3caf5e014Virustotal results 40.98% Heodo
2020-07-30WXF4VNY6Y6MCJPM.docdoc 89b8e39fe7d385d95028dd98f22acbeab0045bf3be2c62108962316db2ec19c6Virustotal results 43.55% Heodo