URLhaus Database

You are currently viewing the URLhaus database entry for https://egger-kirchberg.ch/scripts/nxiwH/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:431509
URL: https://egger-kirchberg.ch/scripts/nxiwH/
URL Status:Offline
Host: egger-kirchberg.ch
Date added:2020-08-13 03:41:45 UTC
Last online:2020-08-13 12:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-13 03:42:09 UTC to abuse{at}hosttech[dot]eu)
Takedown time:9 hours, 5 minutes Good (down since 2020-08-13 12:47:26 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-13Inv_GYJI328_84586885.docdoc 3a957d2e54e658d116c346dcaf0dab5ecaec5e60bf7125b32087746f27cbe35fVirustotal results 26.67%Heodo
2020-08-13INVOICE873060035.docdoc d2cc4f61f498dbddde048bbb918416d73f063a0bb46c960ab7fd6fe671ed9bd1Virustotal results 25.42%Heodo
2020-08-13Inv_7_9855960.docdoc 780339401d94d888dd79a9d81b94ead083dc9070649cdf2e72eb3a6a78eb45d8Virustotal results 26.67%Heodo
2020-08-13INVOICE ISZT01 459544806.docdoc 225e48d5a2210f48804a4463a7c970cb9d79f88b8ca085b379ec5bf95f671b01Virustotal results 25.00%Heodo
2020-08-13Inv_UEUL16_243292.docdoc a9db211b5c0ed36501a165bda0a9c6a4f673bcb350aa5f5b7bfb4a9910f883c0Virustotal results 25.00%Heodo
2020-08-13invoice QQ07 915559801.docdoc d72f36fa492b648c515c4246b7072da043def4709a7e99d87d3a2aa447fb6f2bVirustotal results 26.67%Heodo
2020-08-13Inv-Y2-52465979.docdoc ef4bd4002ad40e14d4be0e1b65b772318b986c643bf1704805b738350cdf8747Virustotal results 25.00%Heodo
2020-08-13invoice_50_1883001.docdoc 27d0c48e8224b8b6607cefeec92b1672e7d61628e58bf2574cb30f1fc9518d2fn/aHeodo
2020-08-13INVOICE UBI0210 6158716.docdoc b6e322f9859749fc8f883d8e46bd164f9b3b406ab9978f5c1daa1ad43325d492Virustotal results 27.12%Heodo
2020-08-13INVOICE_446_083817216.docdoc e1b7a11726c385bcad71dfe791b165802cc625ceaf2f1550a5a10f5f222ea90dVirustotal results 51.67%Heodo
2020-08-13Inv-GVUO103-17714959.docdoc 10531f315432369a9c0706bc00ac1405445316044a9ec07b03de6606a6a9f9fbVirustotal results 55.00%Heodo
2020-08-13INVOICE-TYRK0-7387884.docdoc cd0aaf460944efd580dcc39bc1dd0460f88f2c3c17e303694ffa1eae5020eab2Virustotal results 53.33%Heodo
2020-08-13INVOICENSCW6410153592.docdoc fddf4cab73e6e2ff5c40c7fee09d52d5eb903e6bd17ad77aa292c6ded707f394Virustotal results 55.00%Heodo
2020-08-13InvoiceB4290868278.docdoc 015990746f332cc1ad898d46ef3de53f4ffc95d723ccd19bea5fc12b95f86b47n/aHeodo