asuergroup.com
Open in
urlscan Pro
2001:8d8:100f:f000::2f4
Malicious Activity!
Public Scan
Effective URL: https://asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/SSLAuthUI.html
Submission: On December 26 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G1 on March 13th 2021. Valid for: a year.
This is the only time asuergroup.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chunghwa Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2001:8d8:100f... 2001:8d8:100f:f000::203 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
3 14 | 2001:8d8:100f... 2001:8d8:100f:f000::2f4 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
11 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
asuergroup.com
3 redirects
asuergroup.com |
200 KB |
2 |
llenemoslasollas.org
2 redirects
llenemoslasollas.org |
225 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
14 | asuergroup.com |
3 redirects
asuergroup.com
|
2 | llenemoslasollas.org | 2 redirects |
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.asuergroup.com Encryption Everywhere DV TLS CA - G1 |
2021-03-13 - 2022-03-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/SSLAuthUI.html
Frame ID: AC27CA39AF5DF1BDF76DB12B76D1C0EF
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
信用卡付款頁面Page URL History Show full URLs
-
https://llenemoslasollas.org/kaw
HTTP 301
https://llenemoslasollas.org/kaw/ HTTP 302
https://asuergroup.com/te/A32Q0S/post/internet/Group/ HTTP 302
https://asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9 HTTP 301
https://asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/ HTTP 302
https://asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/SSLAuthUI.html Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://llenemoslasollas.org/kaw
HTTP 301
https://llenemoslasollas.org/kaw/ HTTP 302
https://asuergroup.com/te/A32Q0S/post/internet/Group/ HTTP 302
https://asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9 HTTP 301
https://asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/ HTTP 302
https://asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/SSLAuthUI.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
SSLAuthUI.html
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/ Redirect Chain
|
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/SSLAuthUI_fichiers/ |
118 KB 119 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/SSLAuthUI_fichiers/ |
9 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CTBC_W.jpg
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/img/ |
42 KB 43 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cardtype_ss.png
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
card.png
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/img/ |
399 B 546 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Exclamation.png
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/img/ |
481 B 627 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3D_VISA.png
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3D_MASTER.png
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3D_JCB.png
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
twca_ssl.png
asuergroup.com/te/A32Q0S/post/internet/Group/4c2d9/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chunghwa Post (Transportation)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
asuergroup.com
llenemoslasollas.org
2001:8d8:100f:f000::203
2001:8d8:100f:f000::2f4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