evrostar.az
Open in
urlscan Pro
143.95.237.89
Malicious Activity!
Public Scan
Effective URL: http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/login.php?nin1.0%26rpsnv%3D12%26ct%3D13891734...
Submission: On December 04 via api from CA
Summary
This is the only time evrostar.az was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 8 | 143.95.237.89 143.95.237.89 | 36024 (COLO4-CO) (COLO4-CO - Colo4) | |
3 | 92.122.156.31 92.122.156.31 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
9 | 2 |
ASN36024 (COLO4-CO - Colo4, LLC, US)
PTR: ip-143-95-237-89.iplocal
evrostar.az |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a92-122-156-31.deploy.akamaitechnologies.com
secure.wlxrs.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
evrostar.az
2 redirects
evrostar.az |
23 KB |
3 |
wlxrs.com
secure.wlxrs.com |
22 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
8 | evrostar.az |
2 redirects
evrostar.az
|
3 | secure.wlxrs.com |
evrostar.az
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.test.edgekey.net Symantec Class 3 Secure Server CA - G4 |
2017-09-26 - 2018-12-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/login.php?nin1.0%26rpsnv%3D12%26ct%3D1389173413%26rver%3D6.4.6456.0%26wp%3DMBI%26wreply%3Dhttp_%252F%252Fmail.live.com%252Fdefault.aspx%26lc%3D1033%26id%3D64855%26mkt%3Den-us%26cbcxt%3Dmai%26snsc%3D
Frame ID: 14267.1
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://evrostar.az/wp/(-)/cc/hotMAIL/
HTTP 302
http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2 HTTP 301
http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/ Page URL
- http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/dame.php?nin1.0%26rpsnv%3... Page URL
- http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/login.php?nin1.0%26rpsnv%... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://evrostar.az/wp/(-)/cc/hotMAIL/
HTTP 302
http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2 HTTP 301
http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/ Page URL
- http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/dame.php?nin1.0%26rpsnv%3D12%26ct%3D1389173413%26rver%3D6.4.6456.0%26wp%3DMBI%26wreply%3Dhttp_%252F%252Fmail.live.com%252Fdefault.aspx%26lc%3D1033%26id%3D64855%26mkt%3Den-us%26cbcxt%3Dmai%26snsc%3D Page URL
- http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/login.php?nin1.0%26rpsnv%3D12%26ct%3D1389173413%26rver%3D6.4.6456.0%26wp%3DMBI%26wreply%3Dhttp_%252F%252Fmail.live.com%252Fdefault.aspx%26lc%3D1033%26id%3D64855%26mkt%3Den-us%26cbcxt%3Dmai%26snsc%3D Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://evrostar.az/wp/(-)/cc/hotMAIL/ HTTP 302
- http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2 HTTP 301
- http://evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/ Redirect Chain
|
257 B 233 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dame.php
evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NYKpPzcj59cAccountCSSX.css
secure.wlxrs.com/jy5kqke3ytP4lb3i5ZDpNLiWSfajaQ-eDIOI7KaGMzOGtx7r-zkJzcZQdL-oXfcuo!qhAxV70lLofVjqeMaFkn0-MYEtUYM8BG5a7nbwMSo/Base/16.4.4507/ |
101 KB 19 KB |
Stylesheet
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
invis.gif
secure.wlxrs.com/$live.controls.images/is/ |
43 B 43 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
482.GIF
evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/images/ |
6 KB 6 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c4.png
secure.wlxrs.com/$live.controls.images/h/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
01.png
evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/images/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
02.png
evrostar.az/wp/(-)/cc/hotMAIL/e014da4133141352d4d72cac3aaf58c2/images/ |
787 B 787 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
evrostar.az
secure.wlxrs.com
143.95.237.89
92.122.156.31
2b6f24833781f501f585c7c583f5d9aa86aa17ff9cd3ab735e8455645a3d8ae9
30c255dc504a32ea5b4ac7f2e34231790584ec279ab09f598e4ede0084262279
391791f863ffd5ae64f729ee8f0e623e15a57729d2e2040bf7fb96127fabda83
4b0e6a62b21d3b6aeeada5430d4a2b9dc9cb9176c984b26ff92aefcffd71ed4b
87733260f3e7ea14886ad5ffe24e686dc622c826920db4fde934f4ca3f3c1b2f
ca10c9ed6b63eaa44d80d2a12816b77ccf11cc9fbe0ef24118ac1cdce9180270
cb725f174a86bcf23b5b9f53e5b60d53eaa1524f88f4dcec165670a3b0eb6c2c
d12d6c090d39032dad17100c01da36305a25d7ab239ff6f7d99b38b95222bf8d
d71fb752bc1ddebdc8753fa4706280f90e0f03191e610cf65428c34804365e1b