URLhaus Database

You are currently viewing the URLhaus database entry for http://cityviewimport.com/WslnzRSJdCreZy/SEPA/Service-Center which is or has been used to serve malware. Please consider that URLhaus does not differentiate between websites thats have been compromised by hackers and such that has been setup by hackers for serving malware.

Database Entry


ID:89396
URL:http://cityviewimport.com/WslnzRSJdCreZy/SEPA/Service-Center
URL Status:Offline
Host:cityviewimport.com
Date added:2018-12-05 12:59:12 UTC
Threat:Malware download Malware download
Google Safe Browsing:Clean
Spamhaus DBL:Not listed
SURBL:Not listed
Reporter:@Cryptolaemus1
Abuse complaint sent (?): Yes (2018-12-05 13:00:03 UTC to abuse{at}athenixinc[dot]com,slindsey75_athenix{at}endurance[dot]com)
Takedown time:5 hours, 24 minutes Good
Tags:emotet epoch2 heodo

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTSignature
2018-12-052018_12Informationen_betreffend_Transaktion.docdoc98a8871d6599c23fc96d93b8023e5d365bb520be65b9477dfdfc900787eb9f02n/aHeodo
2018-12-052018_12Informationen_betreffend_Transaktion.docdoca6ffa534a17e73e5631f85363c03b07ce74ab9d1fcff9d1d5f34a93d0076894fVirustotal results 13 / 60 (21.67)Heodo
2018-12-052018_12Informationen_betreffend_Transaktion.docdoc1448252fdb32819e23aa0e8e0d85e1068c3caf3002c929b30525299fe270a581n/a
2018-12-052018_12Informationen_zur_Transaktion.docdoc1b11eb3250e38969955bc7b5029ec6d82d8a0bb0ac009c7d53290efb491fc85eVirustotal results 13 / 59 (22.03)Heodo
2018-12-052018_12Details_zur_Transaktion.docdoc024ddd0f64a1d5ceaba3cced5bdf6e7ffd6d4f2fe018dda9a97432d672382d25Virustotal results 13 / 59 (22.03)
2018-12-052018_12Details_betreffend_Transaktion.docdocf3e94698495f62e9acda8522a134dabf667f5f4b83e0a2fb9cd66664a8ce0c84n/a
2018-12-052018_12Details_bzgl_Transaktion.docdoc96233210015c727f269916a870f4917a83153a8893f7c1a64210ce2ad45eca4cVirustotal results 13 / 58 (22.41)
2018-12-052018_12Informationen_bzgl_Transaktion.docdoc9be92e94cd44e0e666f3f46f915b376868ef2013e2f48dab1913d52926bd068cVirustotal results 13 / 60 (21.67)
2018-12-052018_12Details_zur_Transaktion.docdocf584027e9326158f7d29ffda1224c9c3ba9687d051346a21b990cd56efc1b7a7Virustotal results 13 / 60 (21.67)Heodo
2018-12-052018_12Informationen_zur_Transaktion.docdoc3b1325a48dce3ca730ef02e4f93a202ebe4e25f6c41c6a8655823cf6c9d02bb3Virustotal results 13 / 58 (22.41)Heodo
2018-12-052018_12Details_zur_Transaktion.docdoc3f92c788c6aa0f8828f4f678236270fd6514d612fd1f66f175f1856665a94557Virustotal results 13 / 58 (22.41)Heodo
2018-12-052018_12Informationen_betreffend_Transaktion.docdocd622c1e912b5fbb00ddefea54e9c53ec843ae5bc342fbe769cf1b2d0b7df02b8Virustotal results 13 / 58 (22.41)
2018-12-052018_12Informationen_betreffend_Transaktion.docdocdafe8002172c169da7983c59e2237a43aa04759d4931ddf832271da916a66c9aVirustotal results 13 / 58 (22.41)
2018-12-052018_12Informationen_betreffend_Transaktion.docdoc37edcc1132066e9b747b5a044b362f733f27767a7d9771c468a13e13e1365f71Virustotal results 11 / 59 (18.64)Heodo
2018-12-052018_12Details_betreffend_Transaktion.docdoc5504e436a278e6749f9f02e722631f9262f2898ab163ab2380d0ca30d1b52d5dVirustotal results 10 / 57 (17.54)
2018-12-052018_12Details_bzgl_Transaktion.docdoc4bf60228830c09e931dc043aa9632e1c88de876a135faca8592aa71cb5ecf862Virustotal results 11 / 59 (18.64)Heodo
2018-12-052018_12Informationen_betreffend_Transaktion.docdocbecc7a9d1629ab5a5b5ad8c36c8f829917b1e8013bf479344a7b3cd5f9bde811Virustotal results 9 / 49 (18.37)Heodo
2018-12-052018_12Informationen_zur_Transaktion.docdoc45a460c1207435504e7115fa32a563634abbf6bd447c7a9e6685c0f1722541e5Virustotal results 11 / 60 (18.33)Heodo
2018-12-052018_12Informationen_betreffend_Transaktion.docdoced06782adbee46e1cac68babde10e9c0c60be0c6f88ad9f0b460a0302865ff65Virustotal results 13 / 58 (22.41)