URLhaus Database

You are currently viewing the URLhaus database entry for http://azanayoga.com/js/statement/sqw3wuijyoy8/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:597737
URL: http://azanayoga.com/js/statement/sqw3wuijyoy8/
URL Status:Offline
Host: azanayoga.com
Date added:2020-09-22 14:55:08 UTC
Last online:2020-09-22 15:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-09-22 14:56:20 UTC to abuse{at}register[dot]it)
Takedown time:54 minutes Wow (down since 2020-09-22 15:50:37 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-09-2282141664.docdoc 3dbb23434b36b5af1f130c71f68242eab4c94cb3a14fd3d686641753e345d4f8Virustotal results 22.95%Heodo
2020-09-22INV_LX1362277276OM.docdoc ed99c9abc8576f9e4b692791c175a4ecc473f7d0ef399133d6bf21bf533a2e1aVirustotal results 46.77%Heodo
2020-09-22K_RP89OCN07M.docdoc 7f6f580a5ad3bb9a5c0cbe68cda4a926f2f4f7648338fe7bf7b71d82ff3fd200n/aHeodo