URLhaus Database

You are currently viewing the URLhaus database entry for http://apptical.thatsswift.com/wp-includes/esp/54102/38qihguwan-00091/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:725354
URL: http://apptical.thatsswift.com/wp-includes/esp/54102/38qihguwan-00091/
URL Status:Offline
Host: apptical.thatsswift.com
Date added:2020-10-20 20:10:06 UTC
Last online:2020-10-21 23:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?):mail Yes (Ticket DCU003024523 created on 2020-10-20 20:12:05 UTC)
Takedown time:1 day, 3 hours, 11 minutes Poor (down since 2020-10-21 23:23:27 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-21October invoice.docdoc 90828b96547b35641ebd76b91c0200f8f057974be00f528002acf24663c9991fVirustotal results 32.20%Heodo
2020-10-21Invoice #1568788.docdoc 2a603eb060abe8cf0ce5259b69da9cdd0e5c3015332a943828ef24212ae982e8Virustotal results 33.96%Heodo
2020-10-21October Invoice.docdoc 2808f5432076507429694409af31703a91c9d7e104800e8465efbd76926928fcn/a Heodo
2020-10-21INV #1336 FOR PO #02341706.docdoc 7cb289ec6528b0539486ce3cfba77de2603160bea10cc4ffa3343920de3a2963n/a Heodo
2020-10-21form.docdoc 23a1ade50e6b233cd6e8bbc669efda59ef81728ca5861aa8299c6fb0fdaa8c41Virustotal results 29.03% Heodo
2020-10-21Form.docdoc 03e8290f5d44a7d129aa0e9614604b34b4b745f41c4dc8ca80db878cc82c26cdVirustotal results 33.96% Heodo
2020-10-21Form - Oct 21, 2020.docdoc ef59fe140a6b63b4aae9e7e31953441b4560e00bb76a3b2eef15fc04f5e1abb8Virustotal results 27.42%Heodo
2020-10-21GO6925551051NZ.docdoc 326dc3efbb3c157a00369c8ec16b1c404b95a85458b0417cccc92282178a4496n/aHeodo
2020-10-21Invoice #7529518.docdoc 4edbef59b575a4095b13edab1b9c640b1cecc8f25a2b61f93e988285c079b488n/aHeodo
2020-10-2128226.docdoc e9a60c57f83826d551499e5bf6d5e52d163e80c8348699eb508d92f926cacb91Virustotal results 25.86% Heodo
2020-10-21Invoice #530492232.docdoc fe07d08c1aba72440960ac2c0ff5f92e2184de5622e6c5cc2ad858727aae5024Virustotal results 30.19%Heodo
2020-10-21Inv_8920.docdoc eacff736f8b2dd566e31558748f6a61037203b68ec084fdb29476ece21c3c246n/aHeodo
2020-10-21Payment status.docdoc 80dd2f61a2a94711168be21ce9680716bddfab9407a8064b42a59919806c8560Virustotal results 25.81%Heodo
2020-10-2100352784.docdoc d8e0f462d8d75918d376254506d8d9ca846f6fa1f33076a091cd9f61832efbc2Virustotal results 50.94%Heodo
2020-10-21Inv_056893.docdoc a32b8fc89045749411368894b5eb70012518a8d9d1703b940bcbc966c0e40bdfVirustotal results 50.94%Heodo
2020-10-21Inv_3734.docdoc a190cc4bd4d39b253f7e560cdf793dd829f74b0f816bbddc666525007a02412fVirustotal results 47.54%Heodo
2020-10-21Inv_855554.docdoc a9b5951976e5aebe82b1a18ef33e379ec5f3a36a04b89103649e54d7dc746aecVirustotal results 49.06%Heodo
2020-10-21INV #01977 FOR PO #0547280012.docdoc 33931df25bbfed2013a987a32738c165a5799d274381e76cbf534ba189be293eVirustotal results 46.15%Heodo
2020-10-21Inv. 04112.docdoc 5ab195348086d508a9be2e1c480fa60e9de009a7f057dbaf696f8468ec4fe0f5Virustotal results 45.28%Heodo
2020-10-21Payment status.docdoc a83dce48be132b625d87853a68a56238720b2fad3e3bfb67c50bdf1d677a98ddn/aHeodo
2020-10-21006726655.docdoc f230273ae9e5eb57e36f98c374578e1a9856504dfbfbdcc7f815d20ba5974f2dVirustotal results 41.94%Heodo
2020-10-21Copy invoice #90069.docdoc 15680f3d4397a2ea2191e960421dd8650642415c14be15b1495f859bc6b9d7cfVirustotal results 41.94%Heodo
2020-10-21YO069 invoicing.docdoc 663930eb12ff6afb8cd3d0410fcef8fa32edf4964504e10f0cd56af546b0ecb2Virustotal results 41.51%Heodo
2020-10-21invoice.docdoc f75dfd9100b7fb7c93a95812e11a04f911e4ed1f61fafa8b73c747df9898a212n/aHeodo
2020-10-20PO# 10212020.docdoc d590ed65aef80ecdc7f0a44755ee436937f30c0b05287ce6d177b654512940e8Virustotal results 40.98%Heodo
2020-10-20INV_755577.docdoc d2b7e7d77c65f006e6878f64efc31bcc0fdcacf7293e2e19c30e3bf4e40b09fcVirustotal results 38.60%Heodo
2020-10-20INV #00759297 FOR PO #0884508543327.docdoc bc671ede4242e59e050fff534673dd447ebcdb084f7e7504d004ca446707d409Virustotal results 38.98%Heodo
2020-10-20invoice #45994.docdoc 0fd8d47fc4990dfad6cb0567737449722837d2aa312d68143295e1a2846ed1ecVirustotal results 40.32%Heodo
2020-10-20Copy invoice #9452.docdoc a8e92bb15ad9bcd8e93e71644a570c2aeb6d030e2b496412500deb4ee2a23889Virustotal results 37.10%Heodo
2020-10-20form.docdoc 864eeb47c83f4648f5c3a22de6c34559c24f871adfe7490af5c932ee7fbd52f4Virustotal results 32.65%Heodo
2020-10-20Inv_64611.docdoc 2da7885a305894fb4a3cb76ff2aeafc9899cb7c590bf1179feea80f8795f9c30Virustotal results 32.79%Heodo
2020-10-20Form.docdoc 1949d127f8cad19649adb5f4534e1b6eff752a31d5ea73e427d0ef8c90511ceeVirustotal results 32.26%Heodo