www.coronavirusonooeir.luxciosoiop.com
Open in
urlscan Pro
192.254.184.14
Malicious Activity!
Public Scan
Effective URL: http://www.coronavirusonooeir.luxciosoiop.com/?lang=nl&key=1YPVUgf1EDGHas5oDyLHzLAbEBJmEjAznUTwqeCJlZsZRAtspjiBMqLz6xWMz0TM13j4fSMmvNngjobHUVw...
Submission: On March 24 via manual from SG
Summary
This is the only time www.coronavirusonooeir.luxciosoiop.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 192.254.184.14 192.254.184.14 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 185.225.208.133 185.225.208.133 | 13213 (UK2NET-AS) (UK2NET-AS) | |
2 | 67.202.94.94 67.202.94.94 | 32748 (STEADFAST) (STEADFAST) | |
9 | 4 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: zona44.com
www.coronavirusonooeir.luxciosoiop.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
luxciosoiop.com
1 redirects
www.coronavirusonooeir.luxciosoiop.com |
567 KB |
3 |
amung.us
widgets.amung.us whos.amung.us |
7 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
7 | www.coronavirusonooeir.luxciosoiop.com |
1 redirects
www.coronavirusonooeir.luxciosoiop.com
|
2 | whos.amung.us |
widgets.amung.us
|
1 | widgets.amung.us |
www.coronavirusonooeir.luxciosoiop.com
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.coronavirusonooeir.luxciosoiop.com/?lang=nl&key=1YPVUgf1EDGHas5oDyLHzLAbEBJmEjAznUTwqeCJlZsZRAtspjiBMqLz6xWMz0TM13j4fSMmvNngjobHUVwLkFOEbOSIy3VjUCAjN65NJrJENxc5Ac8gQi6rcpR0P24rkcnC6Lujl3SielV4YQ1qo6EXq3fLTqmnkWJ5TUWTaLJrupVgiQUtnVY1PAryyGvlMvEkr0ih
Frame ID: 76F0FF3831047870EE1E43D70A71DFE2
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.coronavirusonooeir.luxciosoiop.com/
HTTP 302
http://www.coronavirusonooeir.luxciosoiop.com/?lang=nl&key=1YPVUgf1EDGHas5oDyLHzLAbEBJmEjAznUTwqeCJlZsZRAtspjiBMqLz6xWMz0T... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.coronavirusonooeir.luxciosoiop.com/
HTTP 302
http://www.coronavirusonooeir.luxciosoiop.com/?lang=nl&key=1YPVUgf1EDGHas5oDyLHzLAbEBJmEjAznUTwqeCJlZsZRAtspjiBMqLz6xWMz0TM13j4fSMmvNngjobHUVwLkFOEbOSIy3VjUCAjN65NJrJENxc5Ac8gQi6rcpR0P24rkcnC6Lujl3SielV4YQ1qo6EXq3fLTqmnkWJ5TUWTaLJrupVgiQUtnVY1PAryyGvlMvEkr0ih Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.coronavirusonooeir.luxciosoiop.com/ Redirect Chain
|
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tSOgnJdhTc3.css
www.coronavirusonooeir.luxciosoiop.com/css/ |
30 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9an7U6cZys0.css
www.coronavirusonooeir.luxciosoiop.com/css/ |
68 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.coronavirusonooeir.luxciosoiop.com/css/ |
2 KB 927 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fEZ5x2OZgwl.js
www.coronavirusonooeir.luxciosoiop.com/js/ |
248 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.coronavirusonooeir.luxciosoiop.com/img/ |
436 KB 436 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
classic.js
widgets.amung.us/ |
12 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
whos.amung.us/pingjs/ |
26 B 210 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
whos.amung.us/pingjs/ |
26 B 210 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)35 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate number| __DEV__ function| __annotator function| __bodyWrapper function| __m function| __t function| __w object| babelHelpers function| define function| require function| requireDynamic function| requireLazy function| __d object| ErrorUtils function| ProfilingCounters object| TimeSlice object| _wau function| __updateOrientation string| cpa string| index object| WAU_ren function| WAU_classic function| WAU_classic_request function| WAU_r_c function| WAU_insert function| WAU_legacy_b function| WAU_la function| WAU_addCommas function| WAU_lrd function| WAU_cps function| docReady object| x string| x1 string| x23 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.coronavirusonooeir.luxciosoiop.com/ | Name: detect Value: dG9rZT0tMSx0b2tlPTAsdG9rZT0xLHRva2U9Mix0b2tlPTM= |
|
www.coronavirusonooeir.luxciosoiop.com/ | Name: toke Value: 1 |
|
www.coronavirusonooeir.luxciosoiop.com/ | Name: PHPSESSID Value: fb22d90353daccbafcff88ea3156e90f |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
whos.amung.us
widgets.amung.us
www.coronavirusonooeir.luxciosoiop.com
185.225.208.133
192.254.184.14
67.202.94.94
1ac9d30429f149441d207de5b86e67f4101468d6c4981b1bddf33db4352ad0c5
2c2d72e351cf9944898cc462425d963967db60456ddba95e14b23ed75fd119a0
3a682ad13e1535e4077c573179247c072d7891ad507c73b7466163562f6c2fa8
3cabcb3a9e93582f1b793c3bc036653f05313a9904aeefc978976428175f99f2
3ec897aa7b62cd15873b2a69c52a895b1654dc497c27b5c7abea832a8ddc4b74
44c1bf66ba4063ae7381e94c953240682ed72adbe52f6f86607299140827bb96
4ca2260e0d48b75934343fea91b91998c6e90e6559d68ee54cef1bbc2a48e5ca
5026661512499fe496495801c4bed78016a41c13c2e0be2cac5566b2e55d6472
83ce75deb1ab74720fe18753ed252cdbb11fb1415fa7336746cdee573f53eed1
b1b6bf36e76f299ba55d4973e5f8973f4a9c9de21be1d7f16b50e92798f37d85