URLhaus Database

You are currently viewing the URLhaus database entry for http://ajwaalmosafer.com/sys-cache/lm/pipnq2lw33/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:694034
URL: http://ajwaalmosafer.com/sys-cache/lm/pipnq2lw33/
URL Status:Offline
Host: ajwaalmosafer.com
Date added:2020-10-14 19:24:06 UTC
Last online:2020-11-04 08:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-14 19:26:03 UTC to abuse{at}alchemy[dot]net,dnsadmin{at}alchemy[dot]net,support{at}vitalix[dot]net)
Takedown time:20 days, 13 hours, 33 minutes Bad (down since 2020-11-04 08:59:07 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-14YODX_CAO_100120_ZZH_101420.docdoc 4b6669601cd6f2cf4f4c223902cfc02d669f56a62a0ef2256162b17e0615cc54Virustotal results 29.03%Heodo
2020-10-14REP_32190444.docdoc 4e2c7d269a6ac0822ab6f3045c0352299c4cc28a7cb08bcb3d1fd3bcfed4d7aaVirustotal results 29.03%Heodo
2020-10-14PO_10142020EX.docdoc a9e59562ca5658ec43071d61fce77558abb474a55724235d4dd56438b640a9f2n/aHeodo