clk-ecalwl.intohabits.com
Open in
urlscan Pro
2606:4700:3033::6815:5019
Malicious Activity!
Public Scan
Effective URL: https://clk-ecalwl.intohabits.com/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwIDE2OjM0OjA2OzEwOzc7bD...
Submission Tags: @phish_report
Submission: On December 01 via api from FI — Scanned from NL
Summary
TLS certificate: Issued by E1 on November 14th 2023. Valid for: 3 months.
This is the only time clk-ecalwl.intohabits.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700:303... 2606:4700:3033::6815:5019 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
intohabits.com
clk-ecalwl.intohabits.com |
866 B |
1 |
newtopoffer.live
1 redirects
clk-ecalwl.newtopoffer.live |
615 B |
1 |
persues.cfd
1 redirects
s-ecalwl.persues.cfd |
613 B |
2 | 3 |
Domain | Requested by | |
---|---|---|
2 | clk-ecalwl.intohabits.com |
clk-ecalwl.intohabits.com
|
1 | clk-ecalwl.newtopoffer.live | 1 redirects |
1 | s-ecalwl.persues.cfd | 1 redirects |
2 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
intohabits.com E1 |
2023-11-14 - 2024-02-12 |
3 months | crt.sh |
This page contains 1 frames:
Frame:
https://clk-ecalwl.intohabits.com/r2_2.php?q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwIDE2OjM0OjA2OzEwOzc7bDs7
Frame ID: D497C3118D36D97C018AE30C81C8FFCE
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://s-ecalwl.persues.cfd/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwID...
HTTP 302
https://clk-ecalwl.newtopoffer.live/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwID... HTTP 302
https://clk-ecalwl.intohabits.com/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwID... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://s-ecalwl.persues.cfd/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwIDE2OjM0OjA2OzEwOzc7bDs7&wgakta=3Dqjhfnt
HTTP 302
https://clk-ecalwl.newtopoffer.live/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwIDE2OjM0OjA2OzEwOzc7bDs7&wgakta=3Dqjhfnt HTTP 302
https://clk-ecalwl.intohabits.com/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwIDE2OjM0OjA2OzEwOzc7bDs7&wgakta=3Dqjhfnt Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
r2.php
clk-ecalwl.intohabits.com/ Redirect Chain
|
129 B 580 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
r2_2.php
clk-ecalwl.intohabits.com/ |
0 286 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
task.domain
Submitted on
December 1st 2023, 1:44:21 am
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN SPYWARE: https://s-ecalwl.persues.cfd/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwIDE2OjM0OjA2OzEwOzc7bDs7&wgakta=3Dqjhfnt sent by RUSSIAN MALNET using harvested emails and MALICIOUS websites: https://s-ecalwl.persues.cfd https://clk-ecalwl.newtopoffer.live https://clk-ecalwl.intohabits.com https://storage.googleapis.com http://tek.in.net https://www.wntrisbttr.com https://docs.google.com https://www.google.com http://dukingdraon.com http://ewhareey.com
Malicious
page.url
Submitted on
December 1st 2023, 1:42:42 am
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN SPYWARE: https://clk-ecalwl.intohabits.com/r2.php?azk=gjkyyw&q=3DNTQ0MjI2OzMwOTUyMDc7MTIzMjsyOzI2MDE7NDsyMDIzLTExLTMwIDE2OjM0OjA2OzEwOzc7bDs7&wgakta=3Dqjhfnt sent by RUSSIAN MALNET using harvested emails and MALICIOUS websites: https://s-ecalwl.persues.cfd https://clk-ecalwl.newtopoffer.live https://clk-ecalwl.intohabits.com https://storage.googleapis.com http://tek.in.net https://www.wntrisbttr.com https://docs.google.com https://www.google.com http://dukingdraon.com
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
clk-ecalwl.intohabits.com
clk-ecalwl.newtopoffer.live
s-ecalwl.persues.cfd
2606:4700:3033::6815:5019
2a06:98c1:3120::3
2a06:98c1:3121::3
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855