URLhaus Database

You are currently viewing the URLhaus database entry for https://mfla.com.pk/fonts/payment/8681766263631/fa846jujegb-00147367/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:726496
URL: https://mfla.com.pk/fonts/payment/8681766263631/fa846jujegb-00147367/
URL Status:Offline
Host: mfla.com.pk
Date added:2020-10-21 01:33:06 UTC
Last online:2020-10-28 21:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-21 01:34:19 UTC to abuse{at}liquidweb[dot]com)
Takedown time:7 days, 19 hours, 29 minutes Bad (down since 2020-10-28 21:04:12 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-21INV #58689 FOR PO #05331106.docdoc 90828b96547b35641ebd76b91c0200f8f057974be00f528002acf24663c9991fVirustotal results 33.96%Heodo
2020-10-21Inv. 44881227.docdoc d9c9cdb661798fec5696237b21371f7bd3b1fdac360a68aa3fc3d863e1d6173aVirustotal results 32.26% Heodo
2020-10-21Inv_448946.docdoc e99ab9a43fda936582d3e49abcd562f045f62340fba2162f933fd97006ee5e17n/a Heodo
2020-10-21PJ0058 invoicing.docdoc 58605ff883aa8ce6029f21718cdb67a185161dd9de039877800960957563c02dVirustotal results 33.96% Heodo
2020-10-21invoice.docdoc 7e16a715b7c0839cbad1c2d364e09038ecf6be14a5645413e7d119aa35140b66Virustotal results 32.08% Heodo
2020-10-21INV #05681 FOR PO #052015987334.docdoc 9ae2a76f7986879c8240f676ae9dec6196bccba2a978f23adccca97489d1e33cVirustotal results 34.62% Heodo
2020-10-21Electronic form.docdoc 6fd624d3041f0bd2b242241ae31cd75caeabaf5d8a8718e32dc5dbffd0f313a1n/aHeodo
2020-10-21Payment status.docdoc ab58608fbd277849ff1d0a208de3180f5bf8cb8773a27a0d1e833d7644503d99n/a Heodo
2020-10-21Invoice.docdoc 335231c83fd73bed46bea76a81706d2348880433f130fd464e81381a81e8f301n/a Heodo
2020-10-21Electronic form.docdoc db5fb70150903040a3e93dd5c87a0b442c28473d2dccb5ca3dc59c2957a243b7Virustotal results 26.23%Heodo
2020-10-21Copy invoice #6402.docdoc a5c730efa90e29c1794f91ceb2bb26d784adfc5cb4390d2421a94306174cf8d2Virustotal results 30.77%Heodo
2020-10-21October Invoice.docdoc 4b091f47077d168f83c5f39f3ca6837c70c9fef749880418389cf07514420dc3Virustotal results 26.23% Heodo
2020-10-21Invoice 00681797.docdoc 80dd2f61a2a94711168be21ce9680716bddfab9407a8064b42a59919806c8560Virustotal results 30.77%Heodo
2020-10-21Invoice #6055257.docdoc d8e0f462d8d75918d376254506d8d9ca846f6fa1f33076a091cd9f61832efbc2Virustotal results 50.94%Heodo
2020-10-21Form.docdoc 7301eb52916c5b004b3f81ebf360c397e25aba900652108420b868313afce2aen/aHeodo
2020-10-21invoice.docdoc 31658c6055bda692c4a944b0dd23ef5f0ef7d312df172a1eafb6317a110f286bVirustotal results 50.94%Heodo
2020-10-21October invoice.docdoc a190cc4bd4d39b253f7e560cdf793dd829f74b0f816bbddc666525007a02412fVirustotal results 47.54%Heodo
2020-10-21Inv_0125.docdoc cbc98038cc0dab8d10dbfa4950f8228777c05eee346ce80ab1f2002c51939ac1Virustotal results 46.15%Heodo
2020-10-21Inv_956342.docdoc e3812e0aa164c68399e61ce76904450c3e6bc028111a3c4df2155e37ad5d01b1Virustotal results 44.44%Heodo
2020-10-21invoices 94846 & 57573.docdoc b5ffec3587a49bc07b737c4a095b6822dfe32ab6f54062ab3720d31490849eaen/aHeodo
2020-10-21Payment status.docdoc 29cdc20b4b547e832ab1e9c0eeff5b71201efe4262d8d542a8b359131f26ed1aVirustotal results 41.67%Heodo