URLhaus Database

You are currently viewing the URLhaus database entry for http://grupoleferas.com/twitterAPI/xxkd-bct-521/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:427116
URL: http://grupoleferas.com/twitterAPI/xxkd-bct-521/
URL Status:Offline
Host: grupoleferas.com
Date added:2020-08-07 10:29:05 UTC
Last online:2020-08-09 21:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-07 10:30:03 UTC to abuse{at}arsys[dot]es)
Takedown time:2 days, 11 hours, 20 minutes Poor (down since 2020-08-09 21:50:09 UTC)
Tags:doc emotet link epoch3 heodo link Quakbot link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-08Inv KD85 383892853.docdoc 5d7f4b905c268a16b873261ceb5f2bca434dbaa45ad6c5b20a3d43091709ace2Virustotal results 39.66% QuakBot
2020-08-08Invoice-YM756-368780.docdoc f2ac567d25e6c1c3423309a6ee7158f3740d1f4b648a3d0b162b83cf1dd3b6b2Virustotal results 38.33% QuakBot
2020-08-08Inv JDWE5 811753.docdoc 06b06f3b9576ce114f9443f1eda165be0ffdf8182d26b478bd9110a5528639ben/a Heodo
2020-08-08InvoiceCROE8129009086015.docdoc 6976f6b22b770cae154126db827c87484c4c1c757099f6a5d477760a364dbb04Virustotal results 39.34% QuakBot
2020-08-08INVOICE_VGIE362_5812241.docdoc 7e6769ef042d11235ccb92f40d7ee699bd81ef995b00f66e10ddd3b5bb5e92dfn/a QuakBot
2020-08-08INVOICEKP22567652264.docdoc 4c353ef6b7ce0abc18d802dc5869a0c6bb88a63e31585b98f518d10fedb62428Virustotal results 39.34% Heodo
2020-08-08Inv-N269-7974820.docdoc db215901595eb9e3359f679ea0018582715a7a540043a00d9417558895ffa6dan/a Heodo
2020-08-08Invoice_QQW106_423224.docdoc 09e2172af9c38a6d8145f2bc5f71ef35e7aa2fa507c32d432b76fbd3e07e6c11n/a QuakBot
2020-08-08INVOICE-CSL8124-0604341.docdoc 2af8a3cbd38150acd1e45a77f8814c1f1e674f022cf22133a4a7f1c978c3db72Virustotal results 39.34% Heodo
2020-08-08INVOICED940043688.docdoc e2f4571846f5b8e17a5481779757851f78f2853f6734ce6ef4a92db0cd0c5de2Virustotal results 38.71% Heodo
2020-08-08INVOICE OTJS689 128452981.docdoc 4230abaf305c2ba58db88a37cafe4fd78fccc75c521116a664286870179be682Virustotal results 40.98% Heodo
2020-08-08invoice-CW12-764441.docdoc c9bdce375621af7dd83001e09e95fa17ae125b59423cda4a4499fb3f31fc1adeVirustotal results 40.98% Heodo
2020-08-08InvSOKX613060395.docdoc 8ee784204fc5d7cb096a234e69f593cb6807f74e01a2393e1d1f9a8e99f22b74Virustotal results 37.10% QuakBot
2020-08-07Inv_0_888767.docdoc b96fed1689b2c0222ba7d01748cd5957cf711e9e891211e899e72fa46b242306Virustotal results 37.10% Heodo
2020-08-07Inv_ZD42_4209399.docdoc d91731a4dfcfb45b578cde0a57e35273bdc0eecf426e738a1f52a32e989c9fb9Virustotal results 37.29% Heodo
2020-08-07InvEHGU6100412541.docdoc 346b0ed5db257c2bf541ae37f57e3971a19bc69310811cbe7fa037768f2136a1Virustotal results 38.33% Heodo
2020-08-07INVOICE O02 42560762.docdoc 96c2710133ec54c60394683f148a94ba31cda1182b21b8f0f3285d78c92c0336Virustotal results 35.48% Heodo
2020-08-07invoice 3 54857137.docdoc dd693242b7c4ea00e3edc941a1b92d17d7effee6af390cd0abda5da40e5f4367Virustotal results 36.67% QuakBot
2020-08-07invoiceOP85723813258.docdoc 3d2f7bb83fc1e0ff00062b026e00645a1f25b5538f799fc47cb8f1878d8d9c39Virustotal results 35.48% QuakBot
2020-08-07Invoice-LH7-232408172.docdoc bb196956c5e57876daf8c64828c2b0cff8f83fc540f7ff492ecd7632f8a235dcVirustotal results 36.07% QuakBot
2020-08-07Inv248302649473.docdoc ebdda6969778acca315a17e1505c60c3ebbf9c13ca2b43a5092c7a32341f06acVirustotal results 29.51% Heodo
2020-08-07invoice-9-51200870.docdoc 737d96d343a18d4739a12d2b949eb31e758fb5e24c17b0c706997154731ac07fVirustotal results 30.65% Heodo
2020-08-07Inv GLRO6 7402549.docdoc 23f821e6c9ca56b683bf96dc9e8d6d19094c60ea1223073f466278f12a2745edVirustotal results 29.03% QuakBot
2020-08-07InvGP8077328.docdoc 3a7e162433ba4372c7e49ee5cb6bd4afb23cde7bc0f19d39edc30aa22473994en/a Heodo
2020-08-07invoice_JZGA2_804039406.docdoc c2ecd3419f71d51acb56c7f02e685cdd46ec96514b459545a931768e2141ae58Virustotal results 27.42% Heodo
2020-08-07invoice J2 962587820.docdoc ab1f576293cc70428b0adcadcbb453c1525ff8bf2fa71d650e52b83ff4092f81Virustotal results 26.67% Heodo
2020-08-07Invoice-CJ0670-55912812.docdoc 288bcc48727e2eed9e8b0c26b5c3e04a3856769d65bfd4065bba4a533237bf36n/a Heodo
2020-08-07INVOICE-Q6-408231.docdoc f2f9d8844e0ea0472349e17048e353522a138927c4b88802535845aa231f0833Virustotal results 24.59% Heodo
2020-08-07Invoice-6-07398859.docdoc 0a4b53e2bf7608fe93c60618cf50a657598aa4fc95b947cc7fa7b8fb0331d561Virustotal results 25.81% Heodo
2020-08-07Inv-GQ89-133194661.docdoc d3c7b17eb10b73fa3e2c519f2e78fbf3d2fc0ceca12fa1eb7b6d2f2b550ee3ecVirustotal results 25.81% Heodo
2020-08-07Inv_RWC240_08348361.docdoc 969a99e247a7799ab5d43893d9ba53bc202dea27b3246da220b250308ea060d4Virustotal results 26.23% Heodo