URLhaus Database

You are currently viewing the URLhaus database entry for http://www.pieszczek-racing.pl/bus-travel.pl/swift/vj32ndvreux0zy9g9116zywloo/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:704758
URL: http://www.pieszczek-racing.pl/bus-travel.pl/swift/vj32ndvreux0zy9g9116zywloo/
URL Status:Offline
Host: www.pieszczek-racing.pl
Date added:2020-10-17 00:22:05 UTC
Last online:2020-10-19 06:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-17 00:24:02 UTC to abuse{at}ehost[dot]pl)
Takedown time:2 days, 5 hours, 43 minutes Poor (down since 2020-10-19 06:07:06 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-17AY3F6U4Z.docdoc 9e5f94414bcc33c4f9405dd2c0747ccc8c79921dbaab834a1ce8cd0205bb1f9bVirustotal results 54.84%Heodo
2020-10-17DOC_DHO_100120_SGI_101720.docdoc 7f7aaae8116f26c7d91c5c3d87ab7c7a752e628195c25563cc7c3074669e6c7an/aHeodo
2020-10-17JSX_100120_DYG_101720.docdoc 6d5ed047cba0f40a2bd108fdb285520a5590c29ac64b7a9d32a20719905f1e7cVirustotal results 53.23%Heodo
2020-10-17SB_ZJBUUL35H44.docdoc 920a210b924453a21c734f46a853d5eefb835b8f7e33cc3402355037771648c6n/aHeodo
2020-10-1736446321356.docdoc 69e669abaf2af59fb872755c1dbaac25b25cc27d4dd460db7162fe8b3ebdb158Virustotal results 51.61%Heodo
2020-10-17FILE_76174474.docdoc 58a95bd14fdfe2c4e30b7bce237de2fa3351c1bcf0328c91c9333a29a8be15d0Virustotal results 51.61%Heodo
2020-10-17KAZNQ9XQ7NB.docdoc 8358ae3aef04560a786b84a17aa88a981d700993291a3b11aa001fab16829ad9Virustotal results 50.00%Heodo
2020-10-17INV_HHA_100120_EEZ_101720.docdoc c85fe8825461de0503c8b9b612f01c88a1124e0c33ace58d20c22cf40c4bd03fVirustotal results 51.61%Heodo
2020-10-17INV_PO_10172020EX.docdoc d19c1e922354570a8700f8dc25900a7c8ae4bee4b08908a4c6cad2309eff1ba1Virustotal results 51.61%Heodo
2020-10-17R_A7YLYD84EF.docdoc 61cf4ff84de3e35dd24e8df00464aa832912b8c378cbffc5da91abc576c809fdn/aHeodo
2020-10-17WUAE_PO_10172020EX.docdoc cad389f338446345616f9a4f005b47f186be55fdd914d1b88f42bc4f26220685n/aHeodo
2020-10-17INV_JC5995429638OJ.docdoc eb06448eea7b0d73132945671275ea572688e13de195a89974d8315900ff8cb7Virustotal results 52.46%Heodo
2020-10-17DOC_PO_10172020EX.docdoc 5990f98a0aeffb24181deb144a8519e54f7695794e545b9ba0cb52fe28e3f987n/aHeodo
2020-10-17REP_PO_10172020EX.docdoc 99acccb026919eac0d3249c8a9207a71d032fbe59c7540c12aee398ae86e6780Virustotal results 50.00%Heodo
2020-10-17DOC_PO_10172020EX.docdoc 1f9fcb8ad3585c6cbf7250308fc58ebd7fd913baf350cbd3d7fd8934c9e33e43n/aHeodo