URLhaus Database

You are currently viewing the URLhaus database entry for http://80wk.net/wp-admin/docs/7514169/518w8z-0002950/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:735619
URL: http://80wk.net/wp-admin/docs/7514169/518w8z-0002950/
URL Status:Offline
Host: 80wk.net
Date added:2020-10-22 16:56:13 UTC
Last online:2020-10-26 14:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Status unknown
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-22 16:58:04 UTC to abuse{at}ethr[dot]net)
Takedown time:3 days, 21 hours, 47 minutes Bad (down since 2020-10-26 14:45:12 UTC)
Tags:doc emotet link epoch3 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-22US0001 invoicing.docdoc 59235980108e00a0011ebeca9348c5a39ef6d6ec0b052e15ddeb825e9c21e3d5Virustotal results 39.66%Heodo
2020-10-22VCY-100120 HEOS-102320.docdoc eedc1f3d57d4274cbfc97e09ca0975f97fff204e89fe92574f9e3964a569c9d7n/a Heodo
2020-10-22LE-100120 WZEI-102320.docdoc 73afab923f309960ba6ef1f00b4d373abce5e6605b10a2b214ca42b7736f1f6bn/a Heodo
2020-10-22Invoice.docdoc 8b5f6da01149406c0cd0e243ce84b34813ff8c9f09fcf645859516d085f9ae3bn/a Heodo
2020-10-22Invoice #873993709.docdoc 6e126e02b7f4c06d354c623ac04174c9b81ca1ccb03c83f5de29b5722526983dVirustotal results 37.70% Heodo
2020-10-22invoice #0156.docdoc d9e9ce342586063f33aaaaf408ee47cc54b990cacbaab0383bbacc0852320faaVirustotal results 39.62% Heodo
2020-10-22invoices 541 & 6131.docdoc 590f3326107d8c55dee6b4ab08d4a73d007cf21ed92119b2dd72a17a1054564an/a Heodo
2020-10-22Copy invoice #288105.docdoc 966cb3c467c7adddec5950e40aff3b25c8341aeb0919de56c54ec4edc738d19fn/a Heodo
2020-10-22INV_9746.docdoc 9192adc6ad055a6e640fd17c385e4aa7e88fad75617119f2f64efcec5dc4da19n/a Heodo
2020-10-22invoice #6542.docdoc dfb6817c6e31d81f6a98945394150b500c04fb563d8fe9ae170733fc922f8421n/a Heodo
2020-10-22INV_7945.docdoc 9b918b3a0a118f50d3c8d4be4526b1fd8ec10563810c7dbb5088495e471f6b26Virustotal results 32.26% Heodo
2020-10-220087954438.docdoc 5406fe66b809829db1393154a39470f8da4d7b86a2c0ef2e451ad2f19effdb27n/a Heodo
2020-10-22Electronic form.docdoc 54e4fc3613affad5354fc1058f7879031c1191f2e8e79b72df4673bae4603695Virustotal results 50.00% Heodo
2020-10-22Copy invoice #04110.docdoc 74e16bd58ef88cfbc4267cf32b54a6444f5a01675811af2f8da025c1dd9e7272Virustotal results 50.00% Heodo
2020-10-22PO# 10222020.docdoc e1c18ef2692a84d679e77f98cb2d79c78ce841f999715235aa5aac42607ad26an/a Heodo