URLhaus Database

You are currently viewing the URLhaus database entry for http://linkgate.ml/cgi-bin/Scan/899238116969/sU/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:438142
URL: http://linkgate.ml/cgi-bin/Scan/899238116969/sU/
URL Status:Offline
Host: linkgate.ml
Date added:2020-08-21 10:58:09 UTC
Last online:2020-08-21 21:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-21 11:00:03 UTC to abuse{at}a2hosting[dot]com)
Takedown time:10 hours, 51 minutes Good (down since 2020-08-21 21:51:38 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-21Inv. 0889482.docdoc d594bcea91f0259160c0122a56ad8ec4a7896173295fb3b2c197781cb1bbfddcn/aHeodo
2020-08-21August Invoice.docdoc 83e013279f45dc89d5efc3717634b746a611baee472756272e91e1673d8fc3efVirustotal results 32.14%Heodo
2020-08-21Invoice #470555116.docdoc b43df5c0df066a651a976b156ca480e58acf3b61caeb45c08fadfcdb82e46addVirustotal results 31.58%Heodo
2020-08-21INV #0025371 FOR PO #005102559.docdoc 5ad1d00e81e5e6bbc93829790980fabae6eab63a8638ed9bc024a27d083ffb87n/aHeodo
2020-08-21UO0073 invoicing.docdoc 43638c344ac4a446af722c229682fee9a8434923ce1cf6dd1a19bd2a0fc78c21Virustotal results 25.86%Heodo
2020-08-21E0039 invoicing.docdoc dfb4a0445bee97a362ee8ea96a3cb6444bc3ef4b7c96beaa5edf0508e6343c56Virustotal results 25.42%Heodo
2020-08-21invoices 23265 & 9331.docdoc 9c3f81236f7fcb19d6e1304ad6c89255461a66f783e372f62c8fc93fa4bfcd8eVirustotal results 25.86%Heodo
2020-08-21Inv_30805.docdoc fa793702b351ab1f22fa5ff1d20c7f6bf822bd6954f637389577767a163275bdVirustotal results 25.86%Heodo
2020-08-21invoice #995072.docdoc cafc557261c0f9e0e43f24e43efbf14505b54d38271152c48e4a6dd3279769c7n/aHeodo
2020-08-21August Invoice.docdoc 337fac0cbc61c0f73258d843a4a64b68b825d45037b7339ca2ab659fe3e15912Virustotal results 25.00%Heodo
2020-08-21form.docdoc c6c8fb9bb0d155bb4fe8b4b7904de586efbf5c79f49877313b380b848ad12da1Virustotal results 27.12%Heodo
2020-08-21invoice #3397.docdoc 49612d16c5034da0d220d8300787064bc2c03459f17a84b5eda167e9a2e50cfcVirustotal results 21.43%Heodo
2020-08-21form.docdoc 224d0b30bfff0d484bbc3b3cf1f7a97443aaa5656865fa5af8a3d545b3d5048dn/aHeodo
2020-08-21WTO-080120 VGXV-082120.docdoc a99b807165ca13d9f9b50acacbb5c81c8e155e9347c5ff01cee84f4f19806a22Virustotal results 22.41%Heodo
2020-08-21INV #0279 FOR PO #000447741320.docdoc f659cc1fc2dc15e2e1756d19ea55aa52d811ef04957382d2f0063a109926b160Virustotal results 22.41%Heodo
2020-08-21Copy invoice #74337.docdoc 3e4b8326cfd9bfaeb2956b955bf3644032eb675cfd32a6284f371b2d6f68a47bn/aHeodo
2020-08-21INV #0932914 FOR PO #00198028610586.docdoc 69eab92915bca8074c0e4c4a14a6d4532a6d4162923b7c51799ae872c647ee21Virustotal results 21.05%Heodo