URLhaus Database

You are currently viewing the URLhaus database entry for http://shahrakyar.com/cms/esp/467764240206841/kfzeh-0099/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:446175
URL: http://shahrakyar.com/cms/esp/467764240206841/kfzeh-0099/
URL Status:Offline
Host: shahrakyar.com
Date added:2020-08-28 18:22:13 UTC
Last online:2021-07-29 09:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-28 18:24:04 UTC to abuse{at}netmihan[dot]com)
Takedown time:11 months, 4 days, 14 hours, 59 minutes Bad (down since 2021-07-29 09:23:30 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-29RG6815863709BN.docdoc 5df4f10d255d1733e9450ecf67d166c73f6f29bb36efe88d6093a31d31ce0ad4n/aHeodo
2020-08-29August invoice.docdoc 53a81757cc45ec010aa2b5bf957b383898ab0b91b52e51adf5a72e44a9845e51Virustotal results 45.61%Heodo
2020-08-29Copy invoice #88508.docdoc 3b5c4fffd6b0548d5d66842086b1b3762032be24a72ceb3154d72cc55cbb8d83n/aHeodo
2020-08-29J9451786753KN.docdoc 3a8a42c319462b67597a9fefae7c60c0a3917018eef2b0bba8bb02980e6ffe02Virustotal results 44.83%Heodo
2020-08-29Payment.docdoc 139e6af741bc7d94ee44f8a69dbc8e694a72bb780b0b984a2c57cc99966d3e5dVirustotal results 44.07%Heodo
2020-08-29Inv_39832.docdoc 72da2757545a5a82bac55bc0d9ed9ccb5beb853d5af23f8497e6c3be60b5f493Virustotal results 46.55%Heodo
2020-08-29August Invoice.docdoc 3b05f64f06873b3ad6438916c81c4f4139191b2d5a8324a632b2ef7fe4a82803Virustotal results 44.07%Heodo
2020-08-29invoice.docdoc 1f42096613819f1b1cf2ea163ea893ccc965e8b3fc9beb61d4b0a967d2374bb5Virustotal results 38.98%Heodo
2020-08-29T0012 invoicing.docdoc c66bd473b7d5f798e49a832e383311b7929707ca482c2c443fd2a5c9d455f363n/aHeodo
2020-08-29INV_443634.docdoc b8029c0d90d1b4ff550cf1f13603ccb9b462e64c8b81afc2ac33252b86839931Virustotal results 35.59%Heodo
2020-08-29invoice.docdoc c98ebc2ba9a8e8f27e921e635f8742cdbb64688b48b57e7300575ccee61930a5Virustotal results 35.59%Heodo
2020-08-2902238328.docdoc 3859539d7b23160befaa0ee026d5fadadd14d18b595a63a1d2adb1c103a7092bVirustotal results 35.59%Heodo
2020-08-29XJY-080120 WREW-082920.docdoc 60f661d0a3444cbf34c1c249572f83e9d7c73bfcf4aec6790b856574c1906aacVirustotal results 35.59%Heodo
2020-08-29199859.docdoc 939a22a6a05d99ab11db0eb510017c9c6729c96dc78051736fd36ec777fe7196Virustotal results 37.93%Heodo
2020-08-29Invoice 0035121.docdoc a936fa77ef0be55ddc1bba6a24c65da623b7207d45356219d55b2475a4234b9cVirustotal results 36.21%Heodo
2020-08-29OH6125787966XZ.docdoc 7a2ea6bf67afad967a724ca65954848493d2b3d60c68a583219c0d8acff06db4Virustotal results 32.76%Heodo
2020-08-29PO# 08292020.docdoc 8c3d2e0fd7d2cc86088185bf1acaf32d2d7e43124beba918f38856179ade8097Virustotal results 31.03%Heodo
2020-08-28August invoice.docdoc 5db10c40e7788456c57bf2481d95f86b762e85ec74c1ba5a232014afc0b7071en/a Heodo
2020-08-28invoice #87955.docdoc 418cd12b251bce9b75ac793c3d626440b35e8e6ef2002751114a27eb3a627d26Virustotal results 32.14%Heodo
2020-08-28G-080120 MTTS-082920.docdoc a457afd23063f580f5431f2118cc0936362067a7440f76d90eeb270da41508ecVirustotal results 28.81%Heodo
2020-08-28L017 invoicing.docdoc af205422f14b639b4df94286a2e75e65fd7522ea8c0ec60d23af74f197e9a02dVirustotal results 30.00%Heodo
2020-08-28Copy invoice #442874.docdoc 1af25f1feab8bab24a7f9f4531268d94b21a132eb001a1474213e7f92378cef5Virustotal results 28.81%Heodo
2020-08-28INV_98661.docdoc 83a4d7860de46ad541e0399824ba56d53f755c233914096fa08cdf1d966960b0n/aHeodo
2020-08-28form.docdoc b89e478d217b03e8c0042bab248bd9431243f6fbe54c13d26d77b63b93c0c99cVirustotal results 28.81%Heodo
2020-08-28INV #00655 FOR PO #037836472712.docdoc c7042f61131d4a483d3b7433af94d39743944f2fd4e00abf795450a603c883fcVirustotal results 27.12%Heodo
2020-08-28invoices 448 & 5701.docdoc 96955576446f803417498ea62363fb51274e644a275afcd1086cfa9a60df1d92n/aHeodo
2020-08-28Inv_08191.docdoc 81cadd314f1bf342797da22c3d89200bc29b25a928bd3a8241d2864d3a6d4771Virustotal results 27.59%Heodo
2020-08-28Invoice.docdoc efddb6ce3f85a172356a95dfe3e262efff6d615be2339031c4ac5a68d7d2b2dfn/aHeodo
2020-08-28Electronic form.docdoc 0187bb23d3c816a8fa4fdac5bf0757f9fd1cf665e02c084ff2bde0960ed39d6en/aHeodo
2020-08-28Inv_001848.docdoc 8e0a43dba192a9953d51771fbb1935e32f67fe8ec37566325e406fecd46c36a6n/aHeodo
2020-08-28Payment status.docdoc 17040e536cb711011ddfe95c5302469d68db8f57e368902fa164633d4104c7e3Virustotal results 43.10%Heodo
2020-08-28form.docdoc 46b076137177b23ae075a88129e5312d697964b009bb52d0184358b3b71fb1dcn/aHeodo