URLhaus Database

You are currently viewing the URLhaus database entry for http://takahiro-okada-portfolio.com/fonts/bop3lmq9cgw/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:624143
URL: http://takahiro-okada-portfolio.com/fonts/bop3lmq9cgw/
URL Status:Offline
Host: takahiro-okada-portfolio.com
Date added:2020-09-29 17:12:05 UTC
Last online:2020-09-30 01:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-09-29 17:14:14 UTC to hostmaster{at}nic[dot]ad[dot]jp)
Takedown time:7 hours, 59 minutes Good (down since 2020-09-30 01:13:35 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-09-30INV_8344271647312520779457618.docdoc 9503120eff8e09bde10d7341fc02b19428bf024bfa48b4db12e902ce9895be55Virustotal results 30.65%Heodo
2020-09-30SYK_90293720.docdoc 4a9f3550003b6a5732c04dafb0112c4a68a0e1b9b00f0244bbf65efc7561823en/aHeodo
2020-09-30DOC_SI7080413501HG.docdoc 96658effd966024181bb6c0128804f37e523120f12108dcc80230e636aa0e291Virustotal results 30.65%Heodo
2020-09-30G_5601748021519.docdoc c7e94b09a7bf83d363a7949d7aef5bba5516bd5b0e0c149bbd1dc341b9cd5180Virustotal results 31.15%Heodo
2020-09-29DOC_OFT_090120_YXT_093020.docdoc d6baf92252e2e3e673077f1cea8fc4bf0e240f4383dffc91c53d88857ba5fdf7Virustotal results 31.15%Heodo
2020-09-29REP_PO_09302020EX.docdoc defbca721d5850239ce954155a629ed1728ce578781b3e387d8c6305144f0838n/aHeodo
2020-09-29REP_YDIUMPYYI73V2NG.docdoc fbdacf9e30368d59414b52f459d935964b7833d6d8467bf0eb4ccfa97f71e4d6Virustotal results 29.03%Heodo
2020-09-29DOC_ENW_090120_NMM_093020.docdoc 0a9fb69a602d43df0ec8d95c2efc4363bba8536cb03debf2b59c809e88e8f86fVirustotal results 29.03%Heodo
2020-09-29FILE_39505157.docdoc a7bac9b6662da2eb4c3fa6f12c10d790ab6b8ef1735241fcd2a4d35a152a8965Virustotal results 27.42%Heodo
2020-09-29I_85244953.docdoc 14e6ea40cc1e124fe353ed7aeb27490dad58d6a116bfddc62aacaa02921c5d88Virustotal results 32.26%Heodo
2020-09-29VYP_090120_JMJ_093020.docdoc 11100f29550f9f249ed0327bea61368816cd31217a92c786e124fe1a4ca8e50cVirustotal results 32.26%Heodo
2020-09-29INV_4781608184898885952027.docdoc e25bfe6c425630e394d75eb14cd5d21d0731496beff151ad23c69e89ca8ca434n/a Heodo
2020-09-29BAL_63545564.docdoc a095afd7c5b07a957a1d143f7546b88f867b12a2d7ecd78c22c68f7db4f75e4an/aHeodo
2020-09-29OGT_1680456627.docdoc 7cdee39270f137f336d212ea12891255c2c592f1ceb9953b87c8957a15098c43Virustotal results 30.65%Heodo
2020-09-29MFO_090120_KOM_092920.docdoc 1973d2f06ae252b0c09f5f6376f2ccff3a8149c4b660eed973baab1921e80dc7Virustotal results 32.26%Heodo
2020-09-29PO_09292020EX.docdoc 4c12091055b16db3d329d221e16a7de91f9dbc93593c907716507d7e3eeb8a53n/aHeodo
2020-09-29PO_09292020EX.docdoc 28d8b1debd531ebe8e665f3c39a2ac24368f0bec5bdad18264416f150ac1b256n/aHeodo
2020-09-29INV_XJ1892828344KP.docdoc 21921523bd8b5e3823892a5501daea9648ac8ce71189730a3b77b619a89a31dfVirustotal results 32.26%Heodo
2020-09-29FILE_PO_09292020EX.docdoc 9dc751fd044947bb90aa060a2412b345a516fe9ba93b43d4f5dae6afd14f8f3cVirustotal results 30.65%Heodo
2020-09-29BAL_VI2704998566ME.docdoc 5df6cbfa0bdc098fc0cd65902c6d6da3b7e62512eb0b6cd8f2f4ba4227a32c5dn/a Heodo
2020-09-296014848620537214366458.docdoc 1a5c6149c4447267a0c56f3333aa587c52c6e3b0aff4f5a2df9b4d8b33ea1af2n/aHeodo
2020-09-29INV_61668018.docdoc 497e3a22da2b7e3f15b709ae48774acaab651969c4325a4a32a28325a809ee1dn/aHeodo
2020-09-29INV_0U9T95AVRL83M13U.docdoc f3d6ed2b7916c28d5f38990d6120edd5e03b50591d07859194b43ce144654f84Virustotal results 31.15%Heodo