www.securembly.it
Open in
urlscan Pro
2620:1ec:48:1::45
Public Scan
URL:
https://www.securembly.it/eur/8794e153-c3bd-4479-8bea-61aeaf167d5a/ed32ec02-3e6e-4174-acad-ed2114ed425f/5154cbce-b34e-43e2...
Submission: On July 04 via manual from DE — Scanned from IT
Submission: On July 04 via manual from DE — Scanned from IT
Form analysis
0 forms found in the DOMText Content
Microsoft 365 Security & Compliance Sicherheitsreport Download completed Status:Plugin successful installed Victim details: IP Address: 2a00:ea8:810b:1::79e7 Browser: Edge 114 Operating System: Macintosh Screen Resolution: 3440 x 1440 Browser Dimension: 3385 x 1262 CPU: MacIntel, 8 Cores Browser Plugins: PDF Viewer, Chrome PDF Viewer, Chromium PDF Viewer, Microsoft Edge PDF Viewer, WebKit built-in PDF Cookies Enabled: Enabled Java Enabled: Enabled Browser: Chrome 114 Operating System: Windows OS Screen Resolution: 1600 x 1200 Browser Dimension: 1600 x 1200 CPU: Win32, 12 Cores Browser Plugins: Cookies Enabled: Enabled Java Enabled: Enabled public class MalwareLoader { public static void main(String[] args) { String hostname = "client.ip_adress.socket"; int port = 443; try (Socket socket = new Socket(hostname, port)) { InputStream input = socket.getInputStream(); InputStreamReader reader = new InputStreamReader(input); int character; StringBuilder data = new StringBuilder(); while ((character = reader.read()) != -1) { data.append((char) character); } System.out.println(data); } catch (UnknownHostException ex) { System.out.println("Server not found: " + ex.getMessage()); } catch (IOException ex) { System.out.println("I/O error: " + ex.getMessage()); } } } public class PluginInjector { public static void main(String[] args) { if (args.length < 1) return; URL b0tload3r.ransom.onion; try { url = new URL(args[0]); } catch (MalformedURLException ex) { ex.printStackTrace(); return; } String hostname = url.getHost(); int port = 80; try (Socket socket = new Socket(hostname, port)) { OutputStream output = socket.getOutputStream(); PrintWriter writer = new PrintWriter(output, true); writer.println("HEAD " + url.getPath() + " HTTP/1.1"); writer.println("Host: " + hostname); writer.println("User-Agent: Simple Http Client"); writer.println("Accept: text/html"); writer.println("Accept-Language: en-US"); writer.println("Connection: close"); writer.println(); InputStream input = socket.getInputStream(); BufferedReader reader = new BufferedReader(new InputStreamReader(input)); String line; while ((line = reader.readLine()) != null) { System.out.println(line); } } catch (UnknownHostException ex) { System.out.println("Server not found: " + ex.getMessage()); } catch (IOException ex) { System.out.println("I/O error: " + ex.getMessage()); } } } Download Starter $ 9,90/mo Regular $ 19,90/mo Enterprise $ 29,90/mo About us Contact Events Company Jobs Blog Services Education Partner Community Forum Download Upgrade Subscribe Subscribe to our newsletter to receive exclusive offers and the latest news Do not click facebook twitter linkedin mail -------------------------------------------------------------------------------- Hey Paul Toeben, you were just phished as part of a campaign run by your IT team -------------------------------------------------------------------------------- Don't worry! They have redirected you to this educational page. Let's take a few minutes to learn... This is an attack simulated by your company to make you aware of threats. Website links like https://www.securembly.it may have been compromised by a malicious attacker and been used as a way to collect information about you and your computing environment. It may have also been used to trick you into downloading malicious content, or granting malicous applications access to your data. This is called drive-by attack. The below information could have been collected by an attacker just by your visit to the website. IP Address: 2001:ac8:24:44::13 Learn more