URLhaus Database

You are currently viewing the URLhaus database entry for http://bbia.co.uk/images/esp/80734094569143/gSPMwaQh/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:445889
URL: http://bbia.co.uk/images/esp/80734094569143/gSPMwaQh/
URL Status:Offline
Host: bbia.co.uk
Date added:2020-08-28 08:06:45 UTC
Last online:2023-03-18 16:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-28 08:08:03 UTC to abuse{at}steadfast[dot]net)
Takedown time:2 years, 7 months, 2 days, 8 hours, 8 minutes Bad (down since 2023-03-18 16:16:26 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2021-03-28Form.docdoc aced0419d8c0961b941d51823fdbd0f2ec5866f3bb901648be78e1f6b4443e5dn/a Heodo
2021-03-21Form.docdoc ac91af14a6b1dc26490160cd868b9a7e340fda070dedaa15f65e315aeaf10fcen/a Heodo
2021-03-21Form.docdoc a16a8cd3141336ee43dd6ab929ac8dcae0a1fb5bc79b37729cdf4b9514e93a80n/a Heodo
2021-03-05Form.docdoc e54a085d08d6c801d0f9c37911af54e4e0140661dab6fd4bc128aa90182e4474n/a Heodo
2021-03-05Form.docdoc 2295a4d74a8a65f8b801d9a2fecc6ac432eab0553656d062c5560ce6d7844f60n/a Heodo
2020-08-29Form.docdoc e0e89d9c54afdf37e1a12ee7c9fd555e8e40c5a5c9eca4ad7bc97292dfa1d3aeVirustotal results 28.81%Heodo
2020-08-28CU097 invoicing.docdoc b7c510cec29a7cb4fb0e12aea1e1813f3736da31c1b7dd9c857c4d03a1c9ae42n/aHeodo
2020-08-28Copy invoice #47984.docdoc 164917e33b2936b9448295bc0d2fe08b57ca88d611553f6a966e29ae1a53931aVirustotal results 35.09%Heodo
2020-08-28invoice #41589.docdoc fe67dad19921f5aa8094f795c7d533572b3d6d386e1d3b9d1490738b2150e066Virustotal results 37.29%Heodo
2020-08-28INV_255054.docdoc 56385c138dcd6e1f59be2fadd0cb3e78305d5a8b74de904c00ca85d68aa84809Virustotal results 31.03%Heodo
2020-08-28Invoice 312559.docdoc 1e4247cd718e3c8e11d41fff2bcb19571e03a5ab290cd2073caf398878cb6648Virustotal results 31.03%Heodo
2020-08-28Invoice #4199420.docdoc 9814bfb06f3175001ec302ebd03ed8fae2b6d2e0eea0077648414362b2c285bfn/aHeodo
2020-08-28INV_76316.docdoc 84dca281ab22ac3ce81474e6e1a7eebf2cbff03ffc620598752215112082f416Virustotal results 31.67%Heodo
2020-08-28017328.docdoc 635e1141dfd9268f184274a609f325fe1aa27d7af0a4153fabd3ea891164543eVirustotal results 30.51%Heodo
2020-08-28form.docdoc 5fcecf8fdfc590ef687d6590209ea3c2ea0ad746b5f4746e537cd64813fce05eVirustotal results 30.51%Heodo
2020-08-28Invoice 790152.docdoc 8369cd1f9e4a1892c61f02631be1abae0346cb1972cda90b4cb4a36ede626e7cn/aHeodo
2020-08-28Z-080120 UDJZ-082820.docdoc 14f78c4665f0617cf2929eb0e1b3b0c73b1f525830325f61c853db816aceb1ffVirustotal results 30.51%Heodo