URLhaus Database

You are currently viewing the URLhaus database entry for https://www.js-forum.de/wp-admin/attachments/61pPPZW4eOcGioap0zm/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:754972
URL: https://www.js-forum.de/wp-admin/attachments/61pPPZW4eOcGioap0zm/
URL Status:Offline
Host: www.js-forum.de
Date added:2020-10-27 06:34:04 UTC
Last online:2020-10-27 13:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-10-27 06:36:36 UTC to tech{at}serverprofis[dot]de)
Takedown time:7 hours, 10 minutes Good (down since 2020-10-27 13:47:31 UTC)
Tags:doc emotet link epoch1 heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-10-27rep-5402203.docdoc 8b9bc14174d04626aff50842efc00b33b2bfa494129c4e8a8727f1255a1394c3n/aHeodo
2020-10-27ARC 2020_10_27 987798.docdoc 2722f169bad27f3216510f5be45d6105045e19716d73f8bf6013008f8c54dba8n/a Heodo
2020-10-27REP 20201027 GC724.docdoc fc6cf00da4afbdfa56c224ffca2e8e6d92d4bcb16761e697795a8c7c4fa7be9fn/aHeodo
2020-10-27FILE-3732914.docdoc d768379869d9f34631ab847a39f58231bcc0726c403f07b19eb86f9176552f64n/aHeodo
2020-10-27FILE 20201027 A5372.docdoc 33ea1c974e800552ee4937e289c1c363b2c6156838dddf872f58a6aa22bc0e82n/aHeodo
2020-10-27QKS276-BFW835.docdoc 8d06f2de9fc142f4456cbbf3acd4f656f5efe4cf3739d0b08fa7fdd15b1174ddn/aHeodo
2020-10-27Arc_072325.docdoc 9288feabb7ee47cae3c66d6ed449c22b462d1a3fae77a10b1651c000235fc2a9n/aHeodo
2020-10-27arc_2020_10_27_44019.docdoc 3050648dd1ae9a36c4ddaddc63ea9c18a6084332a0b7ca25a330c22410315af9n/aHeodo
2020-10-27FILE_HQL45259.docdoc 6624e99caef62a4448f00037c9fb126ea4442107153d3f09b90996abfea9d753Virustotal results 31.75%Heodo
2020-10-27Arc_20201027_WM5256.docdoc f480c582b8238e989cd24ce196de764a0758a76c3024c49217c045d0ca22d9a3n/aHeodo
2020-10-27dat MRZ1440.docdoc 84677e7ea6e64057f15f0aa4ac719b15747db42d902d4f70e6a350f6f47dbde8Virustotal results 33.33%Heodo
2020-10-27rep-20201027-9988.docdoc 00f72355a3c3e661dba869458da2c7ca2a377fb9027c3963e263e425a068a9edVirustotal results 29.51%Heodo
2020-10-27list-2020_10_27-Q51177.docdoc 0f84086df046d8247545c6850bdd674cc2ec7f6917a000402e5601f869877440Virustotal results 28.57%Heodo
2020-10-27inf_KZI132.docdoc 0c853172f8eaaa7f3ff2e21bcd3981b8575e6fb51fbd387ac274ea3bf87df3a6n/aHeodo