fems.com.my
Open in
urlscan Pro
103.233.0.82
Malicious Activity!
Public Scan
Effective URL: https://fems.com.my/brandnew/logs/mkb/v3/login.php
Submission: On September 10 via manual from HU
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 2nd 2020. Valid for: 3 months.
This is the only time fems.com.my was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MKB Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 23.228.86.254 23.228.86.254 | 46573 (LAYER-HOST) (LAYER-HOST) | |
4 | 103.233.0.82 103.233.0.82 | 46015 (EXABYTES-...) (EXABYTES-AS-AP Exa Bytes Network Sdn.Bhd.) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
6 | 3 |
ASN46015 (EXABYTES-AS-AP Exa Bytes Network Sdn.Bhd., MY)
PTR: vps.fems.com.my
fems.com.my |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
fems.com.my
fems.com.my |
267 KB |
1 |
googleapis.com
ajax.googleapis.com |
29 KB |
1 |
oodda.com
www.oodda.com |
347 B |
6 | 3 |
Domain | Requested by | |
---|---|---|
4 | fems.com.my |
www.oodda.com
fems.com.my |
1 | ajax.googleapis.com |
fems.com.my
|
1 | www.oodda.com | |
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
oodda.com COMODO RSA Domain Validation Secure Server CA |
2018-01-02 - 2021-01-01 |
3 years | crt.sh |
fems.com.my cPanel, Inc. Certification Authority |
2020-08-02 - 2020-10-31 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-08-19 - 2020-11-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://fems.com.my/brandnew/logs/mkb/v3/login.php
Frame ID: 193640DDCE2F71B604C231EB45E31722
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://www.oodda.com/sales/readme.htm Page URL
- https://fems.com.my/brandnew/logs/mkb/v3/login.php Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.oodda.com/sales/readme.htm Page URL
- https://fems.com.my/brandnew/logs/mkb/v3/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
readme.htm
www.oodda.com/sales/ |
105 B 347 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
fems.com.my/brandnew/logs/mkb/v3/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.PNG
fems.com.my/brandnew/logs/mkb/v3/images/ |
262 KB 262 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.PNG
fems.com.my/brandnew/logs/mkb/v3/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.php
fems.com.my/brandnew/logs/mkb/v3/ |
2 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MKB Bank (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
fems.com.my
www.oodda.com
103.233.0.82
23.228.86.254
2a00:1450:4001:801::200a
048ab912a5d38543ab5defb794a68a4831b08474c5089ac6f4e292616058e6dd
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
4511a3dbfe1c6a99d14ea5c974339e7c82dc5b366b6a48bd4c5bdebb3b843573
ab102ba85f09f2c609a7211a301f31af333acd1adcd0db29d7efebb02e7a59b7
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e89183eb09d93ac7b7c8df484ee88d9242b480d2e4e71330cc8b7e31947f96ad