ubm-bg.org
Open in
urlscan Pro
84.252.55.124
Malicious Activity!
Public Scan
Submission: On October 26 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 6th 2021. Valid for: 3 months.
This is the only time ubm-bg.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: American Express (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 84.252.55.124 84.252.55.124 | 202043 (BIA-) (BIA-) | |
5 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
ubm-bg.org
ubm-bg.org |
78 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | ubm-bg.org |
ubm-bg.org
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ubm-bg.org R3 |
2021-10-06 - 2022-01-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ubm-bg.org/americanexpress.com.axpx-aUrla/home/email2.php
Frame ID: 531508BE3DD765EE46F000C44A31403D
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
email2.php
ubm-bg.org/americanexpress.com.axpx-aUrla/home/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
heads.PNG
ubm-bg.org/americanexpress.com.axpx-aUrla/home/images/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mainsx.PNG
ubm-bg.org/americanexpress.com.axpx-aUrla/home/images/ |
26 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
confirm.PNG
ubm-bg.org/americanexpress.com.axpx-aUrla/home/images/ |
685 B 970 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footers.PNG
ubm-bg.org/americanexpress.com.axpx-aUrla/home/images/ |
29 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: American Express (Financial)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ubm-bg.org
84.252.55.124
0b5feef813b136eae362a0bd7b9320c4fae909cf7048cf7f8b1bfe419a6fbd60
1f6da69acdf733e814cad33a567fc373f845544b200b82d3c10d9e6fad3f0009
563f1e80975ff03f52a97f0f9f9ccfda23dd1b077e208e979839912e68efd4bd
cacb92c5fad197eef2df3ddbb84f2780e8452a9658c94689e2a0f4dd6dc6432d
d97b432ee7790173424b2cd981a5820109e2071d8db0ac2575a7635d407fe365