moszoft.hu
Open in
urlscan Pro
79.172.239.182
Malicious Activity!
Public Scan
Submission: On April 06 via automatic, source phishtank
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on March 3rd 2020. Valid for: 3 months.
This is the only time moszoft.hu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 79.172.239.182 79.172.239.182 | 29278 (DENINET-H...) (DENINET-HU-AS) | |
5 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
moszoft.hu
moszoft.hu |
340 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | moszoft.hu |
moszoft.hu
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
moszoft.hu Let's Encrypt Authority X3 |
2020-03-03 - 2020-06-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://moszoft.hu/enik/
Frame ID: 08391F9F611FC6D0E6240E535E4B3207
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
moszoft.hu/enik/ |
5 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CEE937485A7EE8B7.css
moszoft.hu/enik/ASSETS-73430/_css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
A56F0A635C5032A0.js
moszoft.hu/enik/ASSETS-73430/_js/ |
184 KB 56 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
moszoft.hu/enik/ASSETS-73430/_img/ |
277 KB 273 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
l.png
moszoft.hu/enik/ASSETS-73430/img/ |
5 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| _Z5A46EA5238E19B33 object| _S5A46EA5238E19B33 function| P5A46EA5238E19B33 function| E5A46EA5238E19B33 object| _config string| _translate function| t1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
moszoft.hu/ | Name: toxic_hydra Value: 7f3d799eb300a21c78547031f87607844e395e5b |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
moszoft.hu
79.172.239.182
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
42187e8f846f2e1c3c0ce8142a63693f295625404d3f6eb27291b7a3f22b9449
5165f2efaac409229352f2b7210ef3ce4879b7f6d36b199cc76af7cfa3261b1f
6b045fc533c6aaf0590a2acdf82263388bbf2b1f7695c944b167ff6bd79bc404
f5a6c424ceebb1207b1bf6183240bc298bf5e212a6ee66fb94f233c37ad66695