URLhaus Database

You are currently viewing the URLhaus database entry for http://sirena.kz/wp-content/INC/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:429726
URL: http://sirena.kz/wp-content/INC/
URL Status:Offline
Host: sirena.kz
Date added:2020-08-11 21:56:15 UTC
Last online:2020-08-12 05:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: spamhaus
Abuse complaint sent (?): Yes (2020-08-11 21:58:11 UTC to abuse{at}ps[dot]kz)
Takedown time:7 hours, 27 minutes Good (down since 2020-08-12 05:25:22 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-12FILE_PO_08122020EX.docdoc 035f407beebfa56f402f686f6bf72e0217cf4d4b06106b1dcb3877e1167fdfd7n/aHeodo
2020-08-12BAL_BIO_080120_VLJ_081220.docdoc f9f228e552c3971983d4b5909776c052df083b9b41f65f764ceba0dc9d6219e7Virustotal results 52.54%Heodo
2020-08-12REP_08880785.docdoc e95c19b3173d0c69d60efb950859b2ffd3020235efd6c47ffebddf950a0edf52n/aHeodo
2020-08-12FILE_PO_08122020EX.docdoc 29a8f854081e5f20b6709851863472cd33a1863fbed4867153edf6fcc5e86dc8n/aHeodo
2020-08-12DOC_VP2351920483RQ.docdoc 7575d9ebd2153fdfbf4c1626ec4769e8cdef40ea8e2990670f1cc5cba71a2e7eVirustotal results 51.67%Heodo
2020-08-12DOC_38921867.docdoc 4c3eddd6a41f348b80609e91f83e3a9e22818758105ce3db1de70777baeae682n/aHeodo
2020-08-12KO6240798260KW.docdoc c1225a96e801b4de5bcedc55202f0c3d82b69ee6c31d748289803811a450cbb1n/aHeodo
2020-08-12NIW_080120_JOO_081220.docdoc 5d38e73c8e461773d7bd09fd69760d3e0335e51cd3df39676a4c2af22343c43cVirustotal results 51.67%Heodo
2020-08-12FILE_KS0455786865PE.docdoc e4d1deaefa7f905c5ce7490867ae09ff2d50fdf4162f102e276653c1c46eeab6Virustotal results 50.85%Heodo
2020-08-1144004824624.docdoc 5a95e436c4df9dfb41496c96489d1bddf6db2c7d54ccf0761eb61ef1af9c83a0Virustotal results 50.88%Heodo
2020-08-11REP_66307071.docdoc 896db11ae3dd47bbbdaef6de2e44964142461c89f1fd377015b96affcc75cf60Virustotal results 50.85%Heodo
2020-08-11BAL_5XQQHGVTTV.docdoc 854be831ad01f15c5a5cc2f0f253d059b2a9faaac66db5b90fe51b3daa401c57n/aHeodo
2020-08-11OOZR_O9GG87T.docdoc 1aac25866333e7f77dc237137353a0a65ce189972d87658229eae96e3037bc68Virustotal results 51.72%Heodo
2020-08-11YD8218466494LV.docdoc 1d09b28a4d454266d52d7d2e5b9aeab2bbf43839ec33c9a7221eafae3c28c067Virustotal results 51.67%Heodo
2020-08-11REP_SNY_080120_IOO_081220.docdoc 6c5380e193b725ec3ea512a3146d8c0925c7c489800dad57d1b4b2f940751d22n/aHeodo