URLhaus Database

You are currently viewing the URLhaus database entry for http://jswlkeji.com/modules/mod_ariimageslidersa/pep/Payment.zip which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:657
URL:http://jswlkeji.com/modules/mod_ariimageslidersa/pep/Payment.zip
URL Status: Online
Host:jswlkeji.com
Date added:2018-03-27 17:45:57 UTC
Threat:Malware download Malware download
Google Safe Browsing:Clean
Spamhaus DBL:Abused domain (malware)
SURBL:Blacklisted
Reporter:@oppimaniac
Abuse complaint sent (?): Yes (2018-10-26 15:06:01 UTC to anti-spam{at}list[dot]alibaba-inc[dot]com,abuse{at}12321[dot]cn,abuse{at}alibaba-inc[dot]com)
Tags:jar qexvmc zip

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTSignature
2018-04-27n/azip72f2eeb7c257b549c1020b1a303864d314096f156195a15e3910a57dfcc2884dVirustotal results 8 / 58 (13.79)
2018-04-18n/azip72f2eeb7c257b549c1020b1a303864d314096f156195a15e3910a57dfcc2884dVirustotal results 8 / 58 (13.79)
2018-04-07n/azip72f2eeb7c257b549c1020b1a303864d314096f156195a15e3910a57dfcc2884dVirustotal results 8 / 58 (13.79)
2018-03-28n/azip72f2eeb7c257b549c1020b1a303864d314096f156195a15e3910a57dfcc2884dn/a
2018-03-27n/azipd61bef110078c4a6418d77c6539ae8cc39dcb03eb77449700e2f6468a16a7cd0Virustotal results 4 / 58 (6.90)