URLhaus Database

You are currently viewing the URLhaus database entry for http://tedbrengel.com/wp-admin/gg_p_njyjdpr/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:426370
URL: http://tedbrengel.com/wp-admin/gg_p_njyjdpr/
URL Status:Offline
Host: tedbrengel.com
Date added:2020-08-06 15:21:19 UTC
Last online:2020-08-06 16:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-06 15:22:06 UTC to eig-abuse{at}endurance[dot]com)
Takedown time:1 hour, 22 minutes Good (down since 2020-08-06 16:44:25 UTC)
Tags:emotet link epoch2 exe heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-069yTNclrFl5Av9w.exeexe 1ab32830cdc6df63e6a35fd6de647aa13af27e08ad95981fbbcca2751790ae4an/a Heodo
2020-08-06K3gFPuv.exeexe 65e6cc78c18af5e94bd95faca1a3a4ffe05816bbd2004625902ed14a116fcfbaVirustotal results 6.94% Heodo
2020-08-06hhrBIF08OgU.exeexe 2166f83d6e0e8a8a5a6f73465f4333ac93332a48f68cf18932540d61660bcb32n/a Heodo
2020-08-06kYY.exeexe 50e1a6186b7bdee0ecac4687a15295d3f0bef7eff0d0e3b3c5e94d2878b2dc5fn/a Heodo