URLhaus Database

You are currently viewing the URLhaus database entry for http://nostalgic-vagabond-shield.blogs.rockstage.io/sites/public/k9xx7it-00468/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:727032
URL: http://nostalgic-vagabond-shield.blogs.rockstage.io/sites/public/k9xx7it-00468/
URL Status:Offline
Host: nostalgic-vagabond-shield.blogs.rockstage.io
Date added:2020-10-21 05:55:26 UTC
Last online:2020-10-21 17:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-21 06:02:24 UTC to abuse{at}stackpath[dot]com)
Takedown time:11 hours, 37 minutes Good (down since 2020-10-21 17:40:03 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-21RV-100120 QNDC-102120.docdoc 90828b96547b35641ebd76b91c0200f8f057974be00f528002acf24663c9991fVirustotal results 32.20%Heodo
2020-10-21AJY-100120 RXSO-102120.docdoc 2a603eb060abe8cf0ce5259b69da9cdd0e5c3015332a943828ef24212ae982e8n/aHeodo
2020-10-21October Invoice.docdoc 846e5913124d7032c01dffc200b7250ef349a517df8653d0e92ba024b61de295n/aHeodo
2020-10-21PO# 10212020.docdoc 958a56b45155799f98c055be1da4870f014dfc78b57a8c92a1c62c8b9a947248n/a Heodo
2020-10-21invoice.docdoc 7e16a715b7c0839cbad1c2d364e09038ecf6be14a5645413e7d119aa35140b66Virustotal results 32.08% Heodo
2020-10-21Inv_618837.docdoc e60f4878e179f0ebc8af56cc4c3c44c69f9c6ec06200644998a44c536ebdc2d7Virustotal results 34.62% Heodo
2020-10-210129244.docdoc cf82d0365de8c8bb9a11fe55d1c592563309c38f81dd2489d64320006b738393n/a Heodo
2020-10-21Payment.docdoc f492868f49d7ac388ea92c1bf5895ce59c3b1de49e2d3b397a6987eb4c32abacVirustotal results 26.23% Heodo
2020-10-21INV #03229787 FOR PO #557015464747.docdoc 335231c83fd73bed46bea76a81706d2348880433f130fd464e81381a81e8f301Virustotal results 29.09% Heodo
2020-10-21POP-100120 TUQY-102120.docdoc 20822d454fc7b4ccc00e84d41fcfebef444b6d243921dd0e7db0c7252f1e319bVirustotal results 25.81%Heodo
2020-10-21invoice.docdoc 50adbbe45a5b62ff5f3d9a11748102950c470799fd9c4e01eaeb9b93641c5ec6Virustotal results 27.59%Heodo
2020-10-21600581953.docdoc 4b091f47077d168f83c5f39f3ca6837c70c9fef749880418389cf07514420dc3Virustotal results 26.23% Heodo
2020-10-21Form.docdoc a3b6842573584f704d6a8e14964f20811e162c91bcc4e3aa8b0eb7c7948db506Virustotal results 29.09%Heodo
2020-10-21INV #002279472 FOR PO #038611563.docdoc 80dd2f61a2a94711168be21ce9680716bddfab9407a8064b42a59919806c8560Virustotal results 27.12%Heodo
2020-10-21Invoice.docdoc d8e0f462d8d75918d376254506d8d9ca846f6fa1f33076a091cd9f61832efbc2Virustotal results 50.94%Heodo