URLhaus Database

You are currently viewing the URLhaus database entry for http://partner.brndtv.com/jsua/Overview/igYrWPs/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:444980
URL: http://partner.brndtv.com/jsua/Overview/igYrWPs/
URL Status:Offline
Host: partner.brndtv.com
Date added:2020-08-27 06:19:33 UTC
Last online:2020-08-27 10:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-27 06:20:04 UTC to eig-abuse{at}endurance[dot]com)
Takedown time:4 hours, 33 minutes Good (down since 2020-08-27 10:53:12 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-27invoice.docdoc 02db21d12dc0b5d4da95ae253092f640997129f192be9c9bf0ca6132f5cd7e2en/aHeodo
2020-08-27L0867 invoicing.docdoc 1653613e54e13601c4799c80c854d900b5b794b6f042130935272db8d6d1e2dfn/aHeodo
2020-08-27Payment.docdoc 842b433e1fc26b5e7e972fb6ef675ef6997cc2b8cd9311fb2f330707cad0dc0aVirustotal results 28.33%Heodo
2020-08-27Inv_428859.docdoc cbe78f7b605decf53999dc44e92f4b8d9bb13637f7f40d771a04903ad9ec15d4n/aHeodo
2020-08-27Electronic form.docdoc 38aa8eabb4d27eeb9f5150b1d2f27b755f88b11df1a1985794f6677e3c1eb827Virustotal results 28.81%Heodo
2020-08-27Inv. 001186826.docdoc 3655157b27b8b084443564d11a050740b1e72edf7bb35e9b2cc619eb795c52acn/aHeodo
2020-08-27Copy invoice #648163.docdoc d1ce94995d38fb4478f96585dd2cfa3427899e1d34645aaa4a83f0abd1a25e69Virustotal results 27.27%Heodo
2020-08-27form.docdoc 36960985eb5fac4be748ffe766e2d2115dd8a2ac0b9be81f28fa48cc4bec0e23Virustotal results 28.07%Heodo
2020-08-272786479591JF.docdoc c1512720480e93f228b8031e6734ecdfc73c56b37e5cfb116e114b4010b3675an/aHeodo
2020-08-27form.docdoc 08531c896c900816e373957872ce7e55db50203fd681019719dca8fc27882b40Virustotal results 28.81%Heodo
2020-08-27Form - Aug 27, 2020.docdoc 767ec0f39324fa5f9e2566956b732cdf27a690960ed8f6e6fdcf9648e363a877n/aHeodo
2020-08-2761433092.docdoc 8961b61c4631b8c84367078e44fc1066f57830e0bc0622af1de7769f82e6442eVirustotal results 28.07%Heodo
2020-08-27Copy invoice #8050.docdoc f663b206e32202cdb2b7fe26738d009a4c1fb76352cb8e9a46bd1a7bc6060bb3Virustotal results 27.59%Heodo
2020-08-27Invoice.docdoc 2bae2742fb283aa2f35ef1722797919ff00e34f7e1868ca7841fc5baafdefe96Virustotal results 44.83%Heodo
2020-08-27PO# 08272020.docdoc 95feb4a035233bbf6d90619d2c6d9948385cc06b894dfdd7fd10cd378797df32Virustotal results 44.83%Heodo