URLhaus Database

You are currently viewing the URLhaus database entry for https://plutusplus.com/wp-includes/74R6D62/KJGI/0471857582144/uujdJ/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:735069
URL: https://plutusplus.com/wp-includes/74R6D62/KJGI/0471857582144/uujdJ/
URL Status:Offline
Host: plutusplus.com
Date added:2020-10-22 14:48:05 UTC
Last online:2020-10-29 10:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-22 14:50:15 UTC to eig-abuse{at}endurance[dot]com)
Takedown time:6 days, 19 hours, 36 minutes Bad (down since 2020-10-29 10:26:16 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-22Invoice 0888049.docdoc 59235980108e00a0011ebeca9348c5a39ef6d6ec0b052e15ddeb825e9c21e3d5Virustotal results 39.66%Heodo
2020-10-220021548310.docdoc eedc1f3d57d4274cbfc97e09ca0975f97fff204e89fe92574f9e3964a569c9d7n/a Heodo
2020-10-22Payment.docdoc 73afab923f309960ba6ef1f00b4d373abce5e6605b10a2b214ca42b7736f1f6bn/a Heodo
2020-10-22invoice.docdoc f95869656ea95b50cdc0dcdc93991a0bff0a1c265541f45bf204766fb5870736n/a Heodo
2020-10-22Copy invoice #265490.docdoc a1ef2e0555f7e14dc268a65a1b25f0961ee37a55170b424ba29ad8ebdd90db69n/a Heodo
2020-10-22Form.docdoc 2beec2edda2346042fdfa829caaa7403e7842e786b9b9e89baaf4cd5e45d189aVirustotal results 36.54%Heodo
2020-10-22Payment.docdoc 3735f679e476203802d9f194df12715cf31c7784072d4140c6630dea9184ce26Virustotal results 37.10% Heodo
2020-10-22PO# 10222020.docdoc 966cb3c467c7adddec5950e40aff3b25c8341aeb0919de56c54ec4edc738d19fn/a Heodo
2020-10-22invoice.docdoc 709d844ebb9040838314e0bb22f53af41eff662d3b322cfac5858710def23245n/a Heodo
2020-10-22invoice #5372.docdoc 5825492e4acb3a6e36349f5fafef4745159e86616e9d38b4db2e2b4c212e3119n/a Heodo
2020-10-22Invoice.docdoc a53f4bb796189439737207c506acde597330328109ac2d78b693d2d6a72e4ba8Virustotal results 32.79% Heodo
2020-10-220047380.docdoc 7ca299ab33e852a2cee3c4afa00aadea67b1d21240fa68de497fed12c1a0d31fn/a Heodo
2020-10-22Inv. 009221.docdoc 9a666094b1345025d71c0b39d2adbd628fe43f2bc867345884787f6505777ce8n/a Heodo
2020-10-22invoice #817258.docdoc ba76faaf67244b22ede91ccbdb43e3988b58539eeac446392d0c61afbb5ef437Virustotal results 49.06% Heodo
2020-10-22Copy invoice #54949.docdoc bfc258207c269b90840c0f912c129f0f366345cdc1c88c174f59a2848a979d8eVirustotal results 49.09% Heodo
2020-10-22Invoice 00502787.docdoc 711fafda2f160ff5d89246ee698c4ba0738663a2a0a61469c401fc03f59b4550Virustotal results 49.09% Heodo
2020-10-22PO# 10222020.docdoc 61c90e0b60ab1ac4a891679a1e051a65654201f44b65be90543c41691ebe8204Virustotal results 50.94% Heodo
2020-10-22Inv. 0089756.docdoc 46035df42146415903e45c8938c23ce819bf83cb2e5328b555ec947a0d1b9bd0Virustotal results 49.06% Heodo
2020-10-22V1764143661OG.docdoc df51e418e047ba848de075954ab841887fafe6e47c6b7b6d529222e3795ecb23Virustotal results 47.54% Heodo