URLhaus Database

You are currently viewing the URLhaus database entry for http://myvi.wpcashcow.com/wp-admin/private_array/test_ogeyox05qht_31o2drf8hqv1os/V82t00Yk_I3kmvfxvdbo4e/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:431805
URL: http://myvi.wpcashcow.com/wp-admin/private_array/test_ogeyox05qht_31o2drf8hqv1os/V82t00Yk_I3kmvfxvdbo4e/
URL Status:Offline
Host: myvi.wpcashcow.com
Date added:2020-08-13 11:00:20 UTC
Last online:2020-08-13 12:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-13 11:02:03 UTC to CloudFlare Anti-Abuse API)
Takedown time:1 hour, 25 minutes Good (down since 2020-08-13 12:27:32 UTC)
Tags:doc emotet link epoch1 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-13Inf 20200813 V747845.docdoc 65e17151cf8bf00538cd1a2c67e9bb722880485e9f9564efe966f57f6882aac9Virustotal results 28.81%Heodo
2020-08-13Mes-20200813.docdoc 7c1ec9b4be7e6c0c420ed6c2788fe96b85289280dc2a9631f084f6223d03a440Virustotal results 30.00%Heodo
2020-08-13Rep_20200813.docdoc 6937a384f975f55d5848a93ccfd5e9c2d51126c7db1c3654f990c2c752871a67n/aHeodo
2020-08-13MES 2020_08_13.docdoc 4693d9d0e11aec439804dc67aa02afff82560ae5ee98ea6bda73298e487e6ad3Virustotal results 27.87%Heodo