Help RSS API Feed Maltego Contact                        

Domain > tactiva.org

More information on this domain is in AlienVault OTX

Is this malicious?

Reports

https://otx.alienvault.com/pulse/56affb4c4637f2355...    
https://otx.alienvault.com/pulse/56b2251167db8c168...    
https://blogs.sophos.com/2016/01/06/the-current-st...    
https://techhelplist.com/spam-list/1039-money-tran...    
https://www.virustotal.com/en/file/a5a5b9e1e629a37...    

Files that talk to tactiva.org

MD5A/V
2c17ca4c2e05ef0551d7618a243466f6[BehavesLike.Win32.AdwareNaviPromo.fh]
201203d5caa58c3378a75a11c0f45b3e
4c3a6b40a7dbdc977f68c149278561c0[Troj.Downloader.Script!c] [VBS/Psyme] [JS/TrojanDownloader.Nemucod.DQ] [JS_CRYPLOD.YYSJR] [VBS.Downloader.877[h]] [JS_CRYPLOD.YYSJR] [Win32.Trojan.Raas.Auto]
ca05942d7d363c62caba7fe0c66e7770
1680835ab6998271127b9d172cf1c691[Suspicious.Cloud.2] [Trojan/Win32.Teslacrypt]
49b620989c6b52ead93430b7685812da[BehavesLike.JS.Downloader.xv]
2b8238af766a56adbd80791bc1db61c5
53f3d23921a2e7499c56d66873b1d3bc[Trojan/Win32.Teslacrypt] [Trojan.Win32.Injector.CRMO]
d9f8ff6470be54daf2a78d65cb099dbe[Win32.Trojan.Raas.Auto] [BehavesLike.JS.Downloader.xv] [JS/DwnLdr-NBY]
60489b2c5e3e0fd401dbb3d4a8f5eeca[JS:Trojan.Script.CTI] [JS/Nemucod.bw] [JS_CRYPLOD.YYSJS] [Trojan-Downloader.JS.Nemucod.m] [JS:Trojan.Script.CTI] [JS:Trojan.Script.CTI] [JS/DwnLdr-NBY] [JS:Trojan.Script.CTI] [JS_CRYPLOD.YYSJS] [BehavesLike.JS.Downloader.xv] [TrojanDownloader:JS/Tescrypt] [JS:Trojan.Script.CTI] [JS:Trojan.Script.CTI] [JS/TrojanDownloader.Nemucod.DS] [JS/Nemucod.DS!tr]
9d47d02062712ca3c58a7d65abc7ec8f[JS/Nemucod.bw] [JS/DwnLdr-NBY] [BehavesLike.JS.Downloader.xv] [JS/Nemucod.DS!tr]
8146533604f892363d789aae4d9c18af
d5371e9330eb120329da1030d47f561f
6c12cd05a7e4e0bd165afdd1859d2201[Artemis!6C12CD05A7E4] [Ransom.TeslaCrypt] [Worm.Ngrbot!uuWa+q9Hpeo] [Suspicious.Cloud.2] [TROJ_FORUCON.BMC] [Worm.Win32.Ngrbot.aycf] [Worm.Win32.A.Ngrbot.357376.D[h]] [Trojan.Inject1.56622] [TROJ_FORUCON.BMC] [BehavesLike.Win32.MysticCompressor.fh] [W32/Trojan.EXSG-0534] [TR/Crypt.ZPACK.192291] [Worm/Win32.Ngrbot] [Trojan.Zusy.D2C118] [Trojan/Win32.Upbot] [VirTool:Win32/CeeInject.GF] [Win32.Worm.Ngrbot.Wopu] [Trojan.Win32.Crypt] [W32/Ngrbot.AYCF!worm] [Crypt_r.AWG] [Adware.Win32.iBryte.EMIU]
6e9a65951344a5b2dc36be82d2b2a926[BehavesLike.JS.Downloader.xv]
68915163576d45b6c3c40dec12715e68
e33e46610bd550876e159948c6c9eccc
435f224bde1af65538cfa5d858aa831f[Artemis!435F224BDE1A] [Ransom.TeslaCrypt] [Uds.Dangerousobject.Multi!c] [W32/Trojan.KJVF-2469] [Suspicious.Cloud.2] [Ransom_CRYPTESLA.YUYAHF] [Trojan-Ransom.Win32.Bitman.hpi] [Win32.Trojan.Bp-dropperv.Bzmy] [Trojan.Encoder.3719] [Ransom_CRYPTESLA.YUYAHF] [BehavesLike.Win32.Backdoor.gc] [Troj/TeslaC-F] [TR/Crypt.Xpack.441786] [Ransom:Win32/Tescrypt.E] [Trojan/Win32.Teslacrypt] [FileCryptor.GQH] [Trojan.Win32.Injector.CRMO]
6d2415a6257352f383d3c9cee7f38f6d[TR/Crypt.ZPACK.192317] [Win32/Kryptik.EMIU] [Trojan.Cryptlock.N!g2] [W32/Kryptik.EMIU!tr] [Ransom*Win32/Tescrypt.A] [Ransom.TeslaCrypt] [Trojan.Win32.Crypt] [Worm.Win32.Ngrbot.aycf] [TROJ_FORUCON.BMC] [Trojan.Inject1.56622]
6e17df4b6fa3112ea4111779dee48f00[TR/Crypt.ZPACK.192328] [Win32/Kryptik.EMIU] [Crypt5.AFRJ] [Trojan.Cryptlock.N!g2] [W32/Kryptik.EMIU!tr] [Trojan.Injector] [Trojan.Win32.Crypt] [Trojan-Ransom.Win32.Bitman.hgt] [TROJ_FORUCON.BMC] [Trojan.Packed.29794]

Whois

PropertyValue
NameALBEIRO ARANZAZU
Organization ZAZU
Email albeiroaranzazu@gmail.com
Address CRA 14 # 42-44
Zip Code 00000
City DOS-DAS
State Risaralda
Country CO
Phone +57.3136625615
NameServer ns1.reinodejusticia.com
Created 2015-05-27 14:32:22
Changed 2015-07-27 03:46:49
Expires 2016-05-27 14:32:22
Registrar PDR Ltd. d/b/a Publi