URLhaus Database

You are currently viewing the URLhaus database entry for https://brownshotelgroup.com/brown.pt/esp/4321763444/sqSsoHJ/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:444132
URL: https://brownshotelgroup.com/brown.pt/esp/4321763444/sqSsoHJ/
URL Status:Offline
Host: brownshotelgroup.com
Date added:2020-08-26 03:02:03 UTC
Last online:2020-08-26 13:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-26 03:04:02 UTC to abuse{at}hetzner[dot]de)
Takedown time:10 hours, 4 minutes Good (down since 2020-08-26 13:08:19 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-26Copy invoice #278374.docdoc d5c549eee018841e8c99ea2b6fdb5d625863689a0758458bed6ce909cf5e3e28n/aHeodo
2020-08-26Invoice 034877.docdoc 56cd053d222934a2bbdb1eab5e5569773d827f68e41571d46e6edeeb7fc10058n/aHeodo
2020-08-26August Invoice.docdoc dd2484c23d966107f9a26cf3adf938cfb0cd6178dd2d7f7bb6885cfc35177828Virustotal results 31.03%Heodo
2020-08-26invoices 539 & 8107.docdoc 73af3e3d835d616a3f9e44aa68344f07c681f1f5e0e329fd0e08f2bb0ea02b97n/aHeodo
2020-08-26SE-080120 TZNV-082620.docdoc c2e1752a4bd5a694402e04334b50e8efd9714164c9fe3dd70d2e3b1dde45d600Virustotal results 28.30%Heodo
2020-08-26Inv. 0837493.docdoc a653ed7fc7b44191a6e35885e211f29497f5a16fe3bf716c6ee745cbe315614dVirustotal results 29.82%Heodo
2020-08-26invoice #1283.docdoc 90706311f68ea29bbbcde95593221febb3c17d6a4dd687990ec5fbefa3b527aen/aHeodo
2020-08-26Payment.docdoc 7b4347c2ddd660563142667857fe50faea6e8a1bd78a81dc2ab502e5b286cc44n/aHeodo
2020-08-26PO# 08262020.docdoc dc6646ccdc79497c62390c8411eac6291fcf522ee18a3bc6d05d142c75ad30ben/aHeodo
2020-08-26Copy invoice #31962.docdoc edf042c7f48eeca9b83d2f316eaa34a7274b386a0ace0c3dd4a97227852a64cdVirustotal results 31.58%Heodo
2020-08-26form.docdoc cd6816d2aa0cf74845a993d21eeaee85e28d9480bd6c1322d7880b0640bd8248Virustotal results 30.51%Heodo
2020-08-26invoice #840144.docdoc 8bf9a63b2f36c474f3f20fbc3d268d1183e77f8479ffdb272f60027db9f66cc6Virustotal results 31.03%Heodo
2020-08-26Invoice 0007427.docdoc 885506e9990187ad03eebbf630b4a73e3c6a73266a7bf9997fd18fee0504035dVirustotal results 31.03%Heodo
2020-08-26Form.docdoc e9017cc8b425ecc8518bb34458a30045dcd446e2ace97b4e0209d0ac3a13de53Virustotal results 31.03%Heodo
2020-08-26invoices 37525 & 99475.docdoc 391b29bbfeca47bf67b0fc05596c5c478efe548b39e530b8cb8d32b3f4ae6df9Virustotal results 31.58%Heodo
2020-08-26Invoice.docdoc da31dd9726bc4aff67976a72360ce783753f92f2036c0453ce46a0b7fdc99bb1Virustotal results 31.58%Heodo