URLhaus Database

You are currently viewing the URLhaus database entry for http://baomihua222.top/wp-admin/esp/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:430290
URL: http://baomihua222.top/wp-admin/esp/
URL Status:Offline
Host: baomihua222.top
Date added:2020-08-12 11:08:11 UTC
Last online:2020-08-12 16:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: spamhaus
Abuse complaint sent (?): Yes (2020-08-12 11:10:03 UTC to ipas{at}cnnic[dot]cn)
Takedown time:5 hours, 14 minutes Good (down since 2020-08-12 16:24:35 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-12BAL_ZU9248684864IG.docdoc c99e3c74dfec6465026a494216c1ac797697cb816f37baa98d571a089dacb73aVirustotal results 32.20%Heodo
2020-08-12FILE_O5QAFNNI7.docdoc 4020a8982e70b51b150cd40a837ea5dfceb35f0a6c9f9858b3fae5e00404ae62n/aHeodo
2020-08-12N_PO_08122020EX.docdoc 5039852e09153172ff5ef82c3e169e6a8c73a0b9f50c3ccdfac9773c3918bc09Virustotal results 28.81%Heodo
2020-08-12DR3916879223WZ.docdoc 801b894083a28702abb0010b0d8c0fdbdb840c5ca75143f0b3651ffcd9f4733cVirustotal results 30.00%Heodo
2020-08-12REP_FUY_080120_TJZ_081220.docdoc 2a604113da3d540e958f07fceaefe7c0bf0b84863093e22b91a9bacea6c0fd55Virustotal results 29.31%Heodo
2020-08-12PO_08122020EX.docdoc ae3f98c31cbf01b3809feeb57990ae8270686b4e716f2c8971f8408ca1676532n/aHeodo
2020-08-12MP0711992001HI.docdoc 8ba174f163ab56df5f8be5039e97d2737cd41edee6deb87ad1fe07aa70c30554n/aHeodo