URLhaus Database

You are currently viewing the URLhaus database entry for http://www.moruga-scorpion.cz/gLXhb-7K91X8d7Ta3jNz_jRfYJEaD-oZH/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:95423
URL:http://www.moruga-scorpion.cz/gLXhb-7K91X8d7Ta3jNz_jRfYJEaD-oZH/
URL Status:Offline
Host:www.moruga-scorpion.cz
Date added:2018-12-14 22:49:30 UTC
Threat:Malware download Malware download
Google Safe Browsing:Clean
Spamhaus DBL:Not listed
SURBL:Not listed
Reporter:@Cryptolaemus1
Abuse complaint sent (?): Yes (2018-12-14 22:50:32 UTC to abuse{at}master[dot]cz)
Takedown time:13 hours, 11 minutes Good
Tags:doc emotet epoch2 heodo

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTSignature
2018-12-15PAYMENT_331425CVQSGG_12_15_18.docdoc0dded430c1958ae0ec60c2d50ab99f562269ad1ee09db17606661bd55cd29c66Virustotal results 22 / 58 (37.93)Heodo
2018-12-15BIZ_9314TSULSVFX_12_14_18.docdoc1feb9716b60057598e90a4d94fd8156d2b113f2ec7b4972fa65d90e79bd856b3Virustotal results 18 / 61 (29.51)Heodo
2018-12-15PAYROLL_5531DKDWJB.docdocef0dc3edb8340cf0103706830ca902c714f5bde45feece5e148b137a8c15820eVirustotal results 23 / 59 (38.98)Heodo
2018-12-15PAYMENT_66493PNTUOFQD.docdoc41d9e3bb2d0e6a22f6ae4fd7860244c0bcb8dc1ef67542d7f274fa60e252f37cn/aHeodo
2018-12-15BIZ_356485FAMTFLV_12_14_18.docdoc27333d8e3079c0211f765f78831e2413ce50351248dfce2a3a8521b243f732dbn/aHeodo
2018-12-15ACH_5RZZQRVWV_12_14_18.docdoca54d77aedf5aa3109420fd4415b22d7f82d293206d431dfa1740e25ae3491191n/a
2018-12-15SWIFT_4425GMHORQ.docdoc28aeb0d752d3483afabaaa6db205bef92ae89904583fffc1a6334ab27d9dd491Virustotal results 20 / 59 (33.90)Heodo
2018-12-15PAYROLL_7088GFCUIEJ.docdoc592ce7de71bfe682b196a02bd1a8cd0880053e15a13ae5bfa7a7c2ee01be4474Virustotal results 21 / 60 (35.00)Heodo
2018-12-15PAYMENT_4IPBQNIG_12_14_18.docdoc4ee3e7905a8bdd8f6b53844f1a758b41e8db40009e04f1cd53418558ad9806f4Virustotal results 22 / 60 (36.67)Heodo
2018-12-15SWIFT_0190CNOYBBAK_12_14_18.docdoc592247ff870494ffe2132d96dc4adb5a0e927d5acf9a8ca55dbd260395b70d58Virustotal results 20 / 61 (32.79)Heodo
2018-12-15PAYROLL_6WDXLMQ_12_14_18.docdoc83cb7bba95779dd6443ae9c7b928b9d45c9cc56e1a7dc6d6846fd1379094d893n/aHeodo
2018-12-15ACH_97706PNEAPL_12_14_18.docdoc59351b32d196cb654b9bc18c62b82b1f2cf1ca50cf9b2e984756d39c130b0fdaVirustotal results 20 / 60 (33.33)Heodo
2018-12-15PAYROLL_258527NPJYHE.docdocc2a0c517cc9be4d2979f5f7a2f49d4f163f6c3d468bd5eb3c4c686fe71338797Virustotal results 20 / 59 (33.90)Heodo
2018-12-15PAY_5105HAUKWALV.docdoc0977160bd8b66fa2bd8433e7973308ae322c03705fda13606cacfb6701eb4eaaVirustotal results 20 / 60 (33.33)Heodo
2018-12-15ACH_423478NTEVEMI_12_14_18.docdoc606e4af9815c3fc9bec39933f3b6db08dee350e735aec38530cc6ff126e27e60Virustotal results 20 / 60 (33.33)Heodo
2018-12-14BIZ_6269ABMLCGZN_12_14_18.docdocbe849032d67a24eda952c62593d2c6d991500c0a8e628fd189fa9ca51a221cdbVirustotal results 19 / 60 (31.67)Heodo
2018-12-14PAYMENT_32WXGSBH_12_14_18.docdoc866e87bd9d1fd9e7b89e86fffc3838c98b0765246aa63f6a912a5bc213c82f10Virustotal results 19 / 58 (32.76)Heodo
2018-12-14ACH_758788JAGQIUU.docdoc2fd64d6d32147411b247ed7f83fe69d4555b581786cc331ade0b524990da4d7aVirustotal results 19 / 60 (31.67)Heodo
2018-12-14PAYMENT_86664XGONCFU_12_14_18.docdocd9df70d18ace618d9ed5f4be2e0c39c572e284e3dbdb8d5a663474904d89c98fVirustotal results 19 / 59 (32.20)Heodo