URLhaus Database

You are currently viewing the URLhaus database entry for http://sunlinealaska.com/cgi-bin/Scan/uyjdkbwe/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:725359
URL: http://sunlinealaska.com/cgi-bin/Scan/uyjdkbwe/
URL Status:Offline
Host: sunlinealaska.com
Date added:2020-10-20 20:18:06 UTC
Last online:2020-10-21 05:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-20 20:20:20 UTC to abuse{at}a2hosting[dot]com)
Takedown time:8 hours, 55 minutes Good (down since 2020-10-21 05:16:16 UTC)
Tags:doc emotet link epoch2 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-21BAL_OM0532221013QJ.docdoc ed628dca8ed590c827cf2e732b0b1555821315553d3f1bb38da11b8cd2da7ca2n/aHeodo
2020-10-21PMO_100120_GQI_102120.docdoc d8d4feb29b46ade146a7b8343070d2a975e4b0e186ca6aac31ea941e46a7af73Virustotal results 50.00%Heodo
2020-10-21INV_YLD8L1KBFYK.docdoc d0337f9e3f826764678ff11fd7e2b49a84db21bd33615cd0cc63e6654c502d9aVirustotal results 46.55%Heodo
2020-10-21INV_YOKWU3G.docdoc 7e61ca1b65ed5f86ae7603431d7296593ded64f620465d59ad3a62e0f1bef5cfn/aHeodo
2020-10-21PO_10212020EX.docdoc 730dc7281140bb144e159ad27638ff4f4d3a021999727a26b7731250343a3f76n/aHeodo
2020-10-21PO_10212020EX.docdoc 614bbd10017422522d46a734ed08de066834e449d5802b036b0231a39b0c043cVirustotal results 34.78%Heodo
2020-10-21G_4NA85J8.docdoc 89e10dbffeb48b429f49468630b9b93f988c4ca3e6a7de17367b398447309bfeVirustotal results 39.66%Heodo
2020-10-21N_PO_10212020EX.docdoc 6eb67022c07e3f32436afc6e89eddb132a4c5d34d733c824ab3dabf51b7c712aVirustotal results 39.62%Heodo
2020-10-21INV_68744681.docdoc 9a65518effade1bf32d7589d7f7a8a028f9fa7f1fca4491673680847d26d3f0aVirustotal results 38.89%Heodo
2020-10-21KRYJ_47444510.docdoc e3b58bc04eecbb1fb55ace8390236594852afd2f07faf2b8bb7c84dec2fb1da1n/aHeodo
2020-10-21W_HU8886474764WL.docdoc 17ac0ed02b6127efefaa0cc936604bc12947c394e902bb8bf88e37b6f0829d9fn/aHeodo
2020-10-20PO_10212020EX.docdoc 4ca0b870975a5eb49d50074ff6d1f7b8481ae723a8aef2ff922accd28ed9a96dn/aHeodo
2020-10-20INV_57266234.docdoc bbd05af56a4dc95314278a40df6390cfc3ed9f3c4986801470aa7c753f4536fbVirustotal results 32.26%Heodo
2020-10-20TML_100120_QCP_102020.docdoc 8cadf5fc31643a1acc9b991d110e039e7e0520e94783c61d9caf5ccb2481915en/aHeodo
2020-10-20ERILOMHSAP.docdoc 8ebe3eb8f2fc91787e217da76d31b3108744220f6cd2a5b74fc6b57c9c681317Virustotal results 42.31%Heodo