URLhaus Database

You are currently viewing the URLhaus database entry for https://juniorrockstar.id/wp-content/available_box/close_warehouse/1QKQw4EnJn_soxdJnjIj/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:436260
URL: https://juniorrockstar.id/wp-content/available_box/close_warehouse/1QKQw4EnJn_soxdJnjIj/
URL Status:Offline
Host: juniorrockstar.id
Date added:2020-08-19 00:20:12 UTC
Last online:2020-09-09 05:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-19 00:22:02 UTC to abuse{at}rackh[dot]co[dot]id)
Takedown time:21 days, 5 hours, 3 minutes Bad (down since 2020-09-09 05:25:18 UTC)
Tags:doc emotet link epoch1 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-19ARC-20200819-0010.docdoc c313812bbf729a2f67dbad9bccebb42106cf1625d5d9c8a3621ee88aff2fbe31n/aHeodo
2020-08-19doc-20200819-L103963.docdoc b4980748305d9329f376c996a7887e4cb40713c823693998d4360500c510062an/aHeodo
2020-08-19LIST-20200819-GS35441.docdoc f3f68fc28f88f06b41667f6c1a4e0dae6f9aea47af21a18d96387535f8b32bfbn/aHeodo
2020-08-19doc-VKY066.docdoc f699e5e937c40657954d65d806f4d999546ffba6d1653cbb4c014823b6077f50Virustotal results 20.00%Heodo
2020-08-19Inf_2020_08_19.docdoc 0438242a3ca04ab173d67a0fcf3cad13a9cfaffc01aac04ffe0050024bc471f3Virustotal results 20.00%Heodo
2020-08-19REP-20200819-96482.docdoc 87a90ac40158e53a2309863a8bebfe1218f13262f87b93db76e5fc79ed1c388eVirustotal results 18.33%Heodo
2020-08-19dat 39791.docdoc 44116755a469545747d98ca4dad33a22c5565d571be3001cb95cb4971c532c3cVirustotal results 18.33%Heodo
2020-08-19dat-2020_08_19-DPM25673.docdoc 6694fe251d3d322846bd820435fba33e44ed217f3f9e2bf3a1ba2f71a2c8b4bcVirustotal results 18.33%Heodo
2020-08-19Dat_20200819_7567467.docdoc a09fb497ce5738081489fafa343ed354128eba16cc5f8f6bfbb26ff79e19ceebVirustotal results 47.46%Heodo
2020-08-19dat_20200819_5783964.docdoc 1c98753feb43790bf0b2979ae0d73c4760638ab1d9c5d6b6336ce2241ba31aa4Virustotal results 45.76%Heodo
2020-08-19doc_20200819.docdoc 305d205cdb3c030f05543db463c783753137d91a3d8c2721189a94fb36e4f7c6Virustotal results 47.46%Heodo
2020-08-19Rep 20200819 497.docdoc 7065577cfc7f1d2a71a9044c23838d7703f1a1e02b2c222ab507407a778aae24Virustotal results 47.46%Heodo
2020-08-19doc 20200819 555.docdoc 18f11f7da4047a7e2c9542c22edd449478756a5225bd21a18d0bd1720369ab6fVirustotal results 47.46%Heodo
2020-08-19FILE.docdoc 7916fa0619bd4a976c48a8b068040591dd8f78f9eb5b2bd3abafc019ec1f0dadn/aHeodo
2020-08-19FILE 20200819 Q0572.docdoc 5a63ce9de6a721eaabedc5a95a579a3eee404a94034db171f646e24517fed367Virustotal results 46.67%Heodo
2020-08-19INF_78308.docdoc e94bbfc806ca8e6182447d1f10e43d213e234887abec37e993057a77a51e3132Virustotal results 45.00%Heodo
2020-08-19arc-2020_08_19-JC63282.docdoc 45a1dbdb6b372ed28b9806469cbe031baa76035067cb69b5e936960e53988a80Virustotal results 44.83%Heodo
2020-08-19arc_2020_08_19_496108.docdoc 7833c0d39d11142241550af1fa9cb743026dc00c841f79a52d695fd8e9bfdd43Virustotal results 46.67%Heodo
2020-08-19mes 2020_08_19.docdoc 63c85fe46afbae39a953f205b3b3d63109f1f4e6aabe61d3d1b9deb3ac66d335n/aHeodo
2020-08-19Mes_20200819_924970.docdoc 5df568ab274842e91a3f5717af61fdbe6827249fc71e135fdc493f5177ccac7aVirustotal results 46.67%Heodo
2020-08-19ARC-60152.docdoc 2fd5c3ff6859dca50a552d3f404e5c82b7c63ce57486b880b0a29ba52123136aVirustotal results 45.00%Heodo