URLhaus Database

You are currently viewing the URLhaus database entry for http://highbloodpressureremedy.org/wp-includes/Overview/sHuoFWOesBnC/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:729593
URL: http://highbloodpressureremedy.org/wp-includes/Overview/sHuoFWOesBnC/
URL Status:Offline
Host: highbloodpressureremedy.org
Date added:2020-10-21 14:10:05 UTC
Last online:2020-10-21 22:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-21 14:10:12 UTC to abuse{at}godaddy[dot]com)
Takedown time:8 hours, 31 minutes Good (down since 2020-10-21 22:41:12 UTC)
Tags:doc emotet link epoch1 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-21LIST_2020_10_22_GHS46206.docdoc 4f80f163799670248fde98a3d08e44d80a30987ed601f6d837aca42641c0e730n/aHeodo
2020-10-21Rep-180.docdoc 6e9c7d2344a9b04e3cbf19b720c085623b1e42f65a465b8014ff6ae68016fcd3Virustotal results 44.07%Heodo
2020-10-21Dat 2020_10_22.docdoc 301cf568e4fe620ea088536605e0337a3e04e40694ddfd1f7b66584b600b1252Virustotal results 43.40%Heodo
2020-10-21doc-20201021.docdoc 0bfd0f8ada9d40a9b2a5b4488cdc5e9f65ee5eb9392124b281f422ef33a911afn/a Heodo
2020-10-21Rep DAV722.docdoc 74c87529363b4abfb536c94df924723c6d3a0e119f4ed159c5fe95ab3e7d0349n/aHeodo
2020-10-21MES-4624189.docdoc 53a72171110a18e1b7b4302fbff1f54163c7e209cd54719f1956d4fc1324559dn/aHeodo
2020-10-21135T-20201021.docdoc 4495e02eb9c67c54be349e4212281f1c652234240082f96a9071ced88e8c6f9cVirustotal results 43.86%Heodo
2020-10-21MES_20201021_233.docdoc 7c72a2b38416a8d0149f3d8e36d0bb7e6ee3fa3292230d3ccdf36ef0e530fea3n/aHeodo
2020-10-21Doc_20201021_4767414.docdoc 859abb1ec18da77d67adf4f8169fdaeb35da9b930db1f093e731b0749f6b82b2n/aHeodo
2020-10-21Attachment-2020_10_21-6785315.docdoc c6399ad2cb80918e4096e5470dc07b0702c875006aa6b83078d85fdbe5a79ae9Virustotal results 39.62%Heodo
2020-10-21dat_20201021_957.docdoc daa1056189a708c56aecf3c760fe3c15eda062b969b53cb871f1e44a934be86dn/aHeodo
2020-10-21UNTITLED-20201021-T987781.docdoc 74bd012e01f0a4116daa5cfe8ec956aac95489e50cfabf9bc45251ab833f8a5aVirustotal results 35.29%Heodo
2020-10-21FILE-20201021-AB5090.docdoc f0415058ab469e03360e6156b90c73936670b6158a993f6060f7220ffa13bd9dn/aHeodo
2020-10-21266_20201021_AYR55686.docdoc a1d14cef317aece443bc010579448ed548c495541c8540cf423fc5f1d8a20fe7n/aHeodo
2020-10-21doc-2020_10_21-T608.docdoc 45e8ab5bf357dac888cc71a4043d96fc6d2b37648c9b3fd4ddefac2a29061431n/aHeodo
2020-10-21Attachment 20201021 222.docdoc b0a31c904ff4253b07ed800ad34632f96db4ffb69c86f8df2e22ffbccb9f3705n/aHeodo