www.securembly.it Open in urlscan Pro
2620:1ec:48:1::45  Public Scan

URL: https://www.securembly.it/eur/8794e153-c3bd-4479-8bea-61aeaf167d5a/ed32ec02-3e6e-4174-acad-ed2114ed425f/5154cbce-b34e-43e2...
Submission: On July 04 via manual from DE — Scanned from IT

Form analysis 0 forms found in the DOM

Text Content

Microsoft 365 Security & Compliance
Sicherheitsreport



Download completed

Status:Plugin successful installed

Victim details:
IP Address: 2a00:ea8:810b:1::79e7
Browser: Edge 114
Operating System: Macintosh
Screen Resolution: 3440 x 1440
Browser Dimension: 3385 x 1262
CPU: MacIntel, 8 Cores
Browser Plugins: PDF Viewer, Chrome PDF Viewer, Chromium PDF Viewer, Microsoft
Edge PDF Viewer, WebKit built-in PDF
Cookies Enabled: Enabled
Java Enabled: Enabled
Browser: Chrome 114
Operating System: Windows OS
Screen Resolution: 1600 x 1200
Browser Dimension: 1600 x 1200
CPU: Win32, 12 Cores
Browser Plugins:
Cookies Enabled: Enabled
Java Enabled: Enabled
public class MalwareLoader {

public static void main(String[] args) { String hostname =
"client.ip_adress.socket"; int port = 443;

try (Socket socket = new Socket(hostname, port)) { InputStream input =
socket.getInputStream(); InputStreamReader reader = new
InputStreamReader(input); int character; StringBuilder data = new
StringBuilder(); while ((character = reader.read()) != -1) { data.append((char)
character); } System.out.println(data);

} catch (UnknownHostException ex) {
System.out.println("Server not found: " + ex.getMessage());
} catch (IOException ex) {
System.out.println("I/O error: " + ex.getMessage()); } } }

public class PluginInjector {

public static void main(String[] args) { if (args.length < 1) return;

URL b0tload3r.ransom.onion;
try { url = new URL(args[0]);

} catch (MalformedURLException ex) { ex.printStackTrace(); return; }
String hostname = url.getHost(); int port = 80;
try (Socket socket = new Socket(hostname, port)) { OutputStream output =
socket.getOutputStream(); PrintWriter writer = new PrintWriter(output, true);
writer.println("HEAD " + url.getPath() + " HTTP/1.1");
writer.println("Host: " + hostname);
writer.println("User-Agent: Simple Http Client");
writer.println("Accept: text/html");
writer.println("Accept-Language: en-US");
writer.println("Connection: close");
writer.println();
InputStream input = socket.getInputStream(); BufferedReader reader = new
BufferedReader(new InputStreamReader(input)); String line; while ((line =
reader.readLine()) != null) { System.out.println(line); }
} catch (UnknownHostException ex) { System.out.println("Server not found: " +
ex.getMessage());
} catch (IOException ex) { System.out.println("I/O error: " + ex.getMessage());
} } }














Download
Starter
$ 9,90/mo
Regular
$ 19,90/mo
Enterprise
$ 29,90/mo
About us
Contact
Events
Company
Jobs
Blog
Services
Education
Partner
Community
Forum
Download
Upgrade

Subscribe
Subscribe to our newsletter to receive exclusive offers and the latest news
Do not click
facebook twitter linkedin mail


--------------------------------------------------------------------------------

Hey Paul Toeben, you were just phished as part of a campaign run by your IT team

--------------------------------------------------------------------------------

Don't worry! They have redirected you to this educational page. Let's take a few
minutes to learn...
This is an attack simulated by your company to make you aware of threats.
Website links like https://www.securembly.it may have been compromised by a
malicious attacker and been used as a way to collect information about you and
your computing environment. It may have also been used to trick you into
downloading malicious content, or granting malicous applications access to your
data. This is called drive-by attack.
The below information could have been collected by an attacker just by your
visit to the website.
IP Address: 2001:ac8:24:44::13
Learn more