URLhaus Database

You are currently viewing the URLhaus database entry for http://cleanbydesignllc.com/cgi-bin/lm/ltm3j9c/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:427233
URL: http://cleanbydesignllc.com/cgi-bin/lm/ltm3j9c/
URL Status:Offline
Host: cleanbydesignllc.com
Date added:2020-08-07 13:58:04 UTC
Last online:2020-08-07 23:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Blocked
DNS4EU :Blocked
Reporter: spamhaus
Abuse complaint sent (?): Yes (2020-08-07 14:00:04 UTC to DCAbuse{at}zayo[dot]com)
Takedown time:9 hours, 16 minutes Good (down since 2020-08-07 23:16:34 UTC)
Tags:doc emotet link epoch2 heodo link Quakbot link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-07REP_PO_08082020EX.docdoc 41051e1b0ef6db0f014593da4cb56df1bd320b0b7f7917b80b0e44f529504443n/a Heodo
2020-08-07REP_JE5961549311AG.docdoc 6db606248d43c819a2ab538c317686648dcd10422fb5a903bd82de9335961828Virustotal results 34.43% Heodo
2020-08-0713089290.docdoc 3f4c381531d4604385f763850e0e32cd72c1b21b78330327c64b2da16e62e9f8n/a Heodo
2020-08-07BAL_12553447.docdoc 3449ebd127fc3e854e9fbe37330f06267533809795a7319df12af6afd25293b6n/a QuakBot
2020-08-0790571878.docdoc 84c95595d065ebc313271e7701ebcc3d4629488ac753f2fcf608a412dd70d14an/a Heodo
2020-08-07PO_08072020EX.docdoc 647e4bdd2ba51f7dfc1c7749092db78d95b64ca550d266e025602d2437cb503dVirustotal results 30.00% Heodo
2020-08-07INV_TUIDC0J81LV6Q.docdoc cb11b1caf24c2fcb7392f2eebaca5b10cc06dcd73edb88a8aca3bd89e80bdfe7Virustotal results 29.03% Heodo
2020-08-07REP_2CCNHDPW024DKCM.docdoc f25c5e9f443b464dbed38aa42167a2815aec93e599800a370ccf574989ca8069n/a Heodo
2020-08-07XTX_080120_QCV_080720.docdoc 12c13b352ba28fe4d4f492f9938a727d01596e908b438e160f970b716ef350b0Virustotal results 26.67% QuakBot
2020-08-07I_OER_080120_TLF_080720.docdoc 500bea7d7174b43a7e97b737cf87aadc01519413b884aed2bd0f60418800fe54Virustotal results 26.23% Heodo
2020-08-0719Z27PHKK.docdoc 22dfe0c94909b2d896f1e8fc556aae5ebe6f0e34e855052507917fd0211f6af1n/a Heodo
2020-08-07PO_08072020EX.docdoc 39f54a264c6f06a36935cc3416dff1e8e83f2c0dc205680966c8510c9dac7fcdn/a Heodo
2020-08-07FILE_VJH_080120_YFV_080720.docdoc 83acfc01aed8937375c8bc98733684caaa595766301ca229d41af7b2c3966921n/a Heodo
2020-08-07H_18239440.docdoc 266f1dda33c84e9fe52431486debbb7854deb10b46cd1f6be9b2fd6bca527e99n/a Heodo