URL: https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlN...
Submission: On October 17 via automatic, source phishtank

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 6 HTTP transactions. The main IP is 50.115.173.13, located in Seattle, United States and belongs to VIRPUS - Wowrack.com, US. The main domain is secureuser.gq.
TLS certificate: Issued by Let's Encrypt Authority X3 on October 14th 2019. Valid for: 3 months.
This is the only time secureuser.gq was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic (Online) PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
6 50.115.173.13 32875 (VIRPUS)
6 1
Apex Domain
Subdomains
Transfer
6 secureuser.gq
secureuser.gq
139 KB
6 1
Domain Requested by
6 secureuser.gq secureuser.gq
6 1

This site contains no links.

Subject Issuer Validity Valid
secureuser.gq
Let's Encrypt Authority X3
2019-10-14 -
2020-01-12
3 months crt.sh

This page contains 1 frames:

Primary Page: https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
Frame ID: EA6A71E2BE5E82907BE5B550FD7C59D5
Requests: 6 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

6
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

139 kB
Transfer

138 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/
7 KB
7 KB
Document
General
Full URL
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.115.173.13 Seattle, United States, ASN32875 (VIRPUS - Wowrack.com, US),
Reverse DNS
mass-depart.studysom.com
Software
Apache /
Resource Hash
86b8cc1a36b001e587b05ee93733e12f2c8da4f27139bd8da1bee5594cdac8ce

Request headers

Host
secureuser.gq
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Date
Thu, 17 Oct 2019 04:04:10 GMT
Server
Apache
Set-Cookie
PHPSESSID=bon76dr6pi0tlk2mn60roj56r1; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Length
7147
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
hok.js
secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/
20 KB
20 KB
Script
General
Full URL
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/hok.js
Requested by
Host: secureuser.gq
URL: https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.115.173.13 Seattle, United States, ASN32875 (VIRPUS - Wowrack.com, US),
Reverse DNS
mass-depart.studysom.com
Software
Apache /
Resource Hash
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 17 Oct 2019 04:04:12 GMT
Last-Modified
Tue, 15 Oct 2019 20:59:45 GMT
Server
Apache
ETag
"4f65-594f943a123e2"
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
20325
sign_in.css
secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/css/
24 KB
24 KB
Stylesheet
General
Full URL
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/css/sign_in.css
Requested by
Host: secureuser.gq
URL: https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.115.173.13 Seattle, United States, ASN32875 (VIRPUS - Wowrack.com, US),
Reverse DNS
mass-depart.studysom.com
Software
Apache /
Resource Hash
3290055cafa251475adbc5c824826b7848e8ed89133d3dbc73c63a0a841a1ac0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 17 Oct 2019 04:04:12 GMT
Last-Modified
Tue, 15 Oct 2019 20:59:46 GMT
Server
Apache
ETag
"5e9f-594f943a35662"
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
24223
jqury.js
secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/js/
84 KB
85 KB
Script
General
Full URL
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/js/jqury.js
Requested by
Host: secureuser.gq
URL: https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.115.173.13 Seattle, United States, ASN32875 (VIRPUS - Wowrack.com, US),
Reverse DNS
mass-depart.studysom.com
Software
Apache /
Resource Hash
2a1f1370eb7b24a307312112427dfd544fb838a8bef66babc936f5e870a22e52

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 17 Oct 2019 04:04:12 GMT
Last-Modified
Tue, 15 Oct 2019 20:59:46 GMT
Server
Apache
ETag
"15147-594f943a2c5da"
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
86343
login.js
secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/js/
910 B
1 KB
Script
General
Full URL
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/js/login.js
Requested by
Host: secureuser.gq
URL: https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.115.173.13 Seattle, United States, ASN32875 (VIRPUS - Wowrack.com, US),
Reverse DNS
mass-depart.studysom.com
Software
Apache /
Resource Hash
92dd48f0faf17873c9b9f3ae2a1000d819225627ee4f1475ca54bd496f82dbdb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 17 Oct 2019 04:04:12 GMT
Last-Modified
Tue, 15 Oct 2019 20:59:46 GMT
Server
Apache
ETag
"38e-594f943a2be0a"
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
910
logins.PNG
secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/img/
2 KB
2 KB
Image
General
Full URL
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/img/logins.PNG
Requested by
Host: secureuser.gq
URL: https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/websc_login/?country.x=&locale.x=en_
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.115.173.13 Seattle, United States, ASN32875 (VIRPUS - Wowrack.com, US),
Reverse DNS
mass-depart.studysom.com
Software
Apache /
Resource Hash
49bb344cab7bb90d18d29713e6bdf6196160d55fb775f8e27ddf28fac3ce60ed

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://secureuser.gq/paypal/online/secure/mostronix/4d868ea0ec05d4210831dc755e09f1b5MWNlY2E4OTljYjUzN2MwOTQ0MzczMjVlNDIwMWFiYWQ=/resolution/css/sign_in.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 17 Oct 2019 04:04:13 GMT
Last-Modified
Tue, 15 Oct 2019 20:59:46 GMT
Server
Apache
ETag
"7a6-594f943a1e732"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
1958

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic (Online) PayPal (Financial)

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| Aes object| Base64 object| Utf8 string| hea2p string| hea2t string| output string| ctrTxt function| $ function| jQuery function| disableselect function| reEnable function| clickIE

1 Cookies

Domain/Path Name / Value
secureuser.gq/ Name: PHPSESSID
Value: bon76dr6pi0tlk2mn60roj56r1