URLhaus Database

You are currently viewing the URLhaus database entry for http://offers.gorilladesk.com/wp-includes/BSEKK-k2nvWANfzv-xvkssptdvzkftp-3g5tx/special-forum/fkju53ptb8h-2x0tvxzz/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:431671
URL: http://offers.gorilladesk.com/wp-includes/BSEKK-k2nvWANfzv-xvkssptdvzkftp-3g5tx/special-forum/fkju53ptb8h-2x0tvxzz/
URL Status:Offline
Host: offers.gorilladesk.com
Date added:2020-08-13 07:45:04 UTC
Last online:2020-08-13 14:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: spamhaus
Abuse complaint sent (?): Yes (2020-08-13 07:46:02 UTC to abuse{at}amazonaws[dot]com)
Takedown time:6 hours, 59 minutes Good (down since 2020-08-13 14:45:13 UTC)
Tags:doc emotet link epoch1 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-13file-83757.docdoc b09d5312cdf462a4d6a25f1b6eca2f90e454efa20bbd19e9c4d2c8c20c1a2b77n/aHeodo
2020-08-13DAT_2020_08_13_DWM7355.docdoc a8a916f66d089d2a2c23ed7f30163860cc91269fb71b2415123cd57e3e424593n/aHeodo
2020-08-13FILE-2020_08_13-U9764.docdoc 21daf21da8f0b098290789d2482e138e7d7aa4cee35835b46dd8684136aa0a2cVirustotal results 30.51%Heodo
2020-08-13rep_2020_08_13.docdoc 4cea566229c73afde8f711ab3753d32bc35a21d9667dd73c709977964aadf3d9Virustotal results 31.15%Heodo
2020-08-13Mes-2020_08_13-6206681.docdoc 59cf60d70be84cb50173a843815e0f1e700e02794af516037a781dec3a6d6be8Virustotal results 28.33%Heodo
2020-08-13Doc-3014816.docdoc 9f729a199518aff47368826d6036e6de95ad82b7d52e78e2fb268a993fbe7634Virustotal results 29.51%Heodo
2020-08-13dat_20200813_232086.docdoc 65e17151cf8bf00538cd1a2c67e9bb722880485e9f9564efe966f57f6882aac9Virustotal results 28.81%Heodo
2020-08-13List_20200813_2058.docdoc 6cf8d828e02676fcc2c22ad19ee2fd0ee77692759904fa9539f52c1ceeac5356Virustotal results 28.33%Heodo
2020-08-13rep_2020_08_13_666875.docdoc 6937a384f975f55d5848a93ccfd5e9c2d51126c7db1c3654f990c2c752871a67Virustotal results 28.33%Heodo
2020-08-13list_2020_08_13_HW002.docdoc e6dc6e50ffc9a797059e2694751f99b03d4952479b2b4d8afb40b5b1b809cba4Virustotal results 26.67%Heodo
2020-08-13List 20200813 3477362.docdoc 8e34aac321039ce22c7bbb89b61257a397013e7b62607102bea64b2fb1f61960Virustotal results 26.67%Heodo
2020-08-13LIST-E5743.docdoc 76bb490090bed7074824b7b620db247726602318c7acfb9e1c16861b79bfdf3dVirustotal results 28.33%Heodo
2020-08-13inf-757951.docdoc 21c04e61b8204b3b63d3420fcf570b5d7d063338639fac037a6748df5386e1a8Virustotal results 27.12%Heodo
2020-08-13FILE-R978.docdoc 5c70b1d9be2e62d3cb581708789ffcafdc47ae8733f09039db0c3c7bfe9041d9Virustotal results 51.67%Heodo