URLhaus Database

You are currently viewing the URLhaus database entry for http://www.fortifi.com/scan/En/New-order which is or has been used to serve malware. Please consider that URLhaus does not differentiate between websites thats have been compromised by hackers and such that has been setup by hackers for serving malware.

Database Entry


ID:91112
URL:http://www.fortifi.com/scan/En/New-order
URL Status:Offline
Host:www.fortifi.com
Date added:2018-12-07 11:45:10 UTC
Threat:Malware download Malware download
Google Safe Browsing:Clean
Spamhaus DBL:Abused domain (malware)
SURBL:Not listed
Reporter:@Cryptolaemus1
Abuse complaint sent (?): Yes (2018-12-07 11:46:11 UTC to abuse{at}uk2group[dot]com)
Takedown time:4 hours, 58 minutes Good
Tags:emotet epoch2 heodo

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTSignature
2018-12-07Accounts - Invoice.docdoc8e97d127098e802a45e9aa402ec0e59d40a11a071585ac48f3aed60e3de441c4Virustotal results 15 / 61 (24.59)
2018-12-07Invoice.docdocb64affd51090ac7a0e74057f5e4790a9c4a05173504155c20ba09156341e4622Virustotal results 17 / 59 (28.81)
2018-12-07Customer No 5677208.docdoc8aeae211e89dcac7f074496fa3018f73184161d2f642813ddc658d7ad9db2e7cVirustotal results 16 / 59 (27.12)
2018-12-07Accounts - Invoice.docdoc581e7322574776e434c10f353a189485bcf5403e71404f6dfad325e67e7492abVirustotal results 16 / 60 (26.67)Heodo
2018-12-07Inv. no. 0C9712995.docdoc4e994a0e0979997e2c0d46e69f266db26775a66a2e084f1dc1345ceb367556a1Virustotal results 15 / 61 (24.59)
2018-12-07Inv. no. 85F9O4436.docdocb0c29c173e40000a666bfe63d32877b4b09116f1180b51d44e717cffc7563d8dVirustotal results 16 / 60 (26.67)Heodo
2018-12-07Statement as at 07.12.2018.docdocd43905f9831dd45024b413dff8cabbf4d4216e63caaddc254eaf118628825792Virustotal results 16 / 59 (27.12)Heodo
2018-12-07Invoice Query.docdoca298c91f874b492ce4a034e35b6fdb034a7ef99a4726c3c26a2f3c15ab253a27Virustotal results 18 / 59 (30.51)Heodo
2018-12-07Inv. no. 8EBV628955.docdoc733724cd6ce25ed3d5e92a3c515662740e27e37106945ce01210b8cb65bdfe60Virustotal results 18 / 58 (31.03)Heodo
2018-12-07Final notice.docdoc295f6ef602b459b74163edb7e3264d4f408747e8d6c8fe3136f9a624d4b1789bVirustotal results 17 / 61 (27.87)Heodo
2018-12-07Billing Invoice - Job # 750536.docdoc661f4e65a7a32354417ac9a85a621f5cb45ac0447aa77dee49704a65d8212e3bVirustotal results 17 / 61 (27.87)Heodo
2018-12-07Statement as at 07.12.2018.docdoc75e804ff47518aa610ac6968198ecb5c1e2e927ca4fd6bc869e979787e47ab2fVirustotal results 16 / 57 (28.07)Heodo
2018-12-07Invoice.docdoc9efeb9ab55947490358b5655cf70f82128b1e57b1c8ded241fa306654253d60cVirustotal results 16 / 60 (26.67)Heodo
2018-12-07Final notice.docdoc445119cdbe8fdab8457ce7c19335a6e52a3badaa3c1b4e32b6af2c91e5514cb4Virustotal results 16 / 58 (27.59)Heodo
2018-12-07Invoice.docdocd7333f9048dfe7ec88a8a146730105ef1370b2e00eec7f7c11da444a92dde162Virustotal results 17 / 59 (28.81)Heodo
2018-12-07New invoice 0VV232473.docdocf9380a7be3227ce423a2af7bc44a215c12149b63a1850d2582dd7ae66325d4a8Virustotal results 18 / 60 (30.00)Heodo
2018-12-07Invoice Query.docdocdd622df9ab616e7fa31ae9d160431dd96953bd297e8dc5294a2b339b77bbd9b6Virustotal results 18 / 60 (30.00)Heodo