URLhaus Database

You are currently viewing the URLhaus database entry for http://mfla.com.pk/fonts/payment/8681766263631/fa846jujegb-00147367/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:727957
URL: http://mfla.com.pk/fonts/payment/8681766263631/fa846jujegb-00147367/
URL Status:Offline
Host: mfla.com.pk
Date added:2020-10-21 07:40:05 UTC
Last online:2020-10-28 21:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: zbetcheckin
Abuse complaint sent (?): Yes (2020-10-21 07:40:11 UTC to abuse{at}liquidweb[dot]com)
Takedown time:7 days, 13 hours, 40 minutes Bad (down since 2020-10-28 21:20:27 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-21INV #58689 FOR PO #05331106.docdoc 90828b96547b35641ebd76b91c0200f8f057974be00f528002acf24663c9991fVirustotal results 32.20%Heodo
2020-10-21invoice.docdoc 3498119a8fd01f12eb785bef90aa0db0abec22057cb338983fee714f612b6fecVirustotal results 32.20% Heodo
2020-10-21October invoice.docdoc bce4a6fe31eb854ee0fc5fb9c17c81ee19922b93a2998de467fdd004aa3ddf37n/a Heodo
2020-10-21Inv. 0217502726.docdoc 958a56b45155799f98c055be1da4870f014dfc78b57a8c92a1c62c8b9a947248Virustotal results 34.62% Heodo
2020-10-21Form.docdoc e45c71c909dafaee0830088e9068e0cb0f2f99e5ab1ff7da592240e46ba6fa58Virustotal results 29.03% Heodo
2020-10-21INV #05681 FOR PO #052015987334.docdoc 9ae2a76f7986879c8240f676ae9dec6196bccba2a978f23adccca97489d1e33cVirustotal results 34.62% Heodo
2020-10-21Form.docdoc 54fe1cf0018e05fbdc865d2ba611867828c9db66dc76d675b6961ec3bddcec2fn/aHeodo
2020-10-21PO# 10212020.docdoc 8cd445b93100d4a1d8b8d09b1829c4460f50271afb165768a5b263664916c0cfVirustotal results 30.77%Heodo
2020-10-21form.docdoc 23fb1844a3cad0f727d5bf74d8ed76b134681db7486450782109d760f792863eVirustotal results 26.67%Heodo
2020-10-210780467.docdoc e8da9916a2da1f9ce4081c005b241bb16bae33ac6774e8fdcfe0da0d155eddben/aHeodo
2020-10-210225424959.docdoc fe07d08c1aba72440960ac2c0ff5f92e2184de5622e6c5cc2ad858727aae5024Virustotal results 29.63%Heodo
2020-10-21Electronic form.docdoc a3b6842573584f704d6a8e14964f20811e162c91bcc4e3aa8b0eb7c7948db506Virustotal results 29.09%Heodo
2020-10-21invoice #56370.docdoc 51ab187886aefdddbe682cc0044049fd5c06bac5f1cda813a77165f3ad31548an/a Heodo