URLhaus Database

You are currently viewing the URLhaus database entry for http://hotwell.at/default/US/OVERDUE-ACCOUNT/Order-9127475344/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:43376
URL: http://hotwell.at/default/US/OVERDUE-ACCOUNT/Order-9127475344/
URL Status:Offline
Host: hotwell.at
Date added:2018-08-16 03:37:58 UTC
Last online:2018-11-26 13:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2018-08-16 03:47:22 UTC to abuse{at}kabsi[dot]at)
Tags:doc emotet link heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2018-08-16Outstanding invoice.docdoc 439d718a08c40fad9c579627611ffa6552e6af8c840ef7c805158f54a4a19c68Virustotal results 25.86% Heodo
2018-08-16Invoice # 95HG55280.docdoc 377896b81460ef61d22b561442c1375220b8e34039bf9efb7bdc1036f5d9600en/a Heodo
2018-08-16Review invoice required.docdoc b35b9a690d5b2b94fb262bf488c8acd5f437ae489024ecec45cf9197d5177053n/a Heodo
2018-08-16Invoice.docdoc c9ac91c9915eba1cf9ee1ce5d8680ab5c37167d17a618fd2c493e73b9c10b853Virustotal results 28.33% Heodo
2018-08-16Statement as at 16.08.2018.docdoc ec882ddee9ec898dbf53f383edfe0b6a95aef111d96004d1d77e169cd89f3eb9Virustotal results 43.10% Heodo
2018-08-16Review invoice required.docdoc 66ebe328415e1eb4e16e3cc17fe1f206f07ad16bc40477760b73e46ccddfbc25n/a Heodo
2018-08-16Accounts - Invoice.docdoc 20fa8fcdbda1c42772ea348b116c88f2a9c80d5744119a2f06c293b67fffbaecVirustotal results 33.90% Heodo