URLhaus Database

You are currently viewing the URLhaus database entry for http://literas.cl/wp-includes/invoice/6v1uj33bjzq8/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:445223
URL: http://literas.cl/wp-includes/invoice/6v1uj33bjzq8/
URL Status:Offline
Host: literas.cl
Date added:2020-08-27 14:11:18 UTC
Last online:2020-08-27 16:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: spamhaus
Abuse complaint sent (?): Yes (2020-08-27 14:12:02 UTC to admin{at}WIRENETCHILE[dot]COM)
Takedown time:1 hour, 54 minutes Good (down since 2020-08-27 16:06:47 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-27XJN_080120_NQF_082720.docdoc 72a047a55409445c1767467b0e67391b0fbdb99be5b2e6a5457df52c7e2ef398Virustotal results 38.60%Heodo
2020-08-27NDH_080120_LFN_082720.docdoc 46bcca8c7bcdecf0bc7ca571bea317f1aadbab8a0d93d7ed83f54c41adcca87dVirustotal results 37.29%Heodo
2020-08-27A_ZT1181289565EQ.docdoc e76b329975ec5d26ea5bc7fb5695439bdd206cd7a6fe0c319f701535f81a21a7Virustotal results 37.29%Heodo