URLhaus Database

You are currently viewing the URLhaus database entry for http://flexitravel.com/XVXcoxDGs/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:427126
URL: http://flexitravel.com/XVXcoxDGs/
URL Status:Offline
Host: flexitravel.com
Date added:2020-08-07 10:52:11 UTC
Last online:2020-08-08 21:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-07 10:54:03 UTC to eig-abuse{at}endurance[dot]com)
Takedown time:1 day, 11 hours, 1 minutes Poor (down since 2020-08-08 21:55:38 UTC)
Tags:doc emotet link epoch3 heodo link Quakbot link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-08invoice-ZBBI36-97500865.docdoc 5d7f4b905c268a16b873261ceb5f2bca434dbaa45ad6c5b20a3d43091709ace2Virustotal results 39.66% QuakBot
2020-08-08Invoice NV3 15394753.docdoc 06b06f3b9576ce114f9443f1eda165be0ffdf8182d26b478bd9110a5528639ben/a Heodo
2020-08-08invoiceQ51725765.docdoc 6976f6b22b770cae154126db827c87484c4c1c757099f6a5d477760a364dbb04Virustotal results 39.34% QuakBot
2020-08-08invoice-3-0767672.docdoc 7e6769ef042d11235ccb92f40d7ee699bd81ef995b00f66e10ddd3b5bb5e92dfn/a QuakBot
2020-08-08invoice-RK42-67223922.docdoc d9117ec342f11a6f9cfe66f8c223ad054a26dc3cde8c442a7a72d537701fbff8Virustotal results 38.71% QuakBot
2020-08-08INVOICE-SPN7-527386.docdoc 83fadccccb33a9b873d6790f162ad11cb83476c3e42ea6c6a6740b0ea5736299Virustotal results 38.71% Heodo
2020-08-08Invoice JZO42 90193499.docdoc 09e2172af9c38a6d8145f2bc5f71ef35e7aa2fa507c32d432b76fbd3e07e6c11n/a QuakBot
2020-08-08INVOICEA37331435290.docdoc 3861a52ad582544a7eed808c49f41588b9620ffc729cc2c9de6a83aca5762fd2Virustotal results 39.34% QuakBot
2020-08-08Inv 17 271061950.docdoc 65ae828750c71374225c39bcfba19a641631b695eafa9df608266f83e63a8c61Virustotal results 38.33% Heodo
2020-08-08Inv-GQW7326-565038632.docdoc b67b32bfd579e0f9ab07e5c28fbffa92e3b061190d7b010a0ac40655aecabbdeVirustotal results 37.10% Heodo
2020-08-08Inv-LWB155-41852155.docdoc 2659421c624afcfc6ad404b436a664c9faae922b703e516ccdcfe79f2cbffb27Virustotal results 37.70% QuakBot
2020-08-07Invoice_ZVJ123_7772030.docdoc 03ebc44cfbcccf33f186b7fa2350c9b7043d031b274921de003e30d9d999dfb8Virustotal results 26.23% Heodo
2020-08-07InvoiceCQER9083180064.docdoc 73a3928db928299dd820e0673e47b3ba4173c06c8c22c488567d1999d11f9033n/a Heodo
2020-08-07Inv-AQHW37-523966694.docdoc 17c24e9605399a8fd3b69265281b97750a2417d86f728163862a51d9d6643ae8Virustotal results 26.23% Heodo