hghasean.com
Open in
urlscan Pro
2606:4700:3035::6815:469a
Malicious Activity!
Public Scan
Submission: On September 22 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on May 8th 2022. Valid for: a year.
This is the only time hghasean.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chunghwa Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 2606:4700:303... 2606:4700:3035::6815:469a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
hghasean.com
hghasean.com |
120 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | hghasean.com |
hghasean.com
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-05-08 - 2023-05-08 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/SSLAuthUI.html
Frame ID: AEB9EAB43AED855492213B3184A83C41
Requests: 11 HTTP requests in this frame
Frame:
https://hghasean.com/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1663848000
Frame ID: E58157CA885808286898DFF8024BA87D
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
信用卡付款頁面Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
SSLAuthUI.html
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/SSLAuthUI_fichiers/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/SSLAuthUI_fichiers/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
CTBC_W.jpg
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/img/ |
42 KB 43 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cardtype_ss.png
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
card.png
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/img/ |
399 B 944 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Exclamation.png
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/img/ |
481 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
3D_VISA.png
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/img/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
3D_MASTER.png
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
3D_JCB.png
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
twca_ssl.png
hghasean.com/wp-content/litespeed/posttw/internet/noesw/bac51/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
invisible.js
hghasean.com/cdn-cgi/challenge-platform/h/b/scripts/alpha/ Frame E581 |
38 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pica.js
hghasean.com/cdn-cgi/challenge-platform/h/b/scripts/ Frame E581 |
20 KB 8 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
74eb4a75eac390f2
hghasean.com/cdn-cgi/challenge-platform/h/b/cv/result/ Frame E581 |
2 B 653 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chunghwa Post (Transportation)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.hghasean.com/ | Name: __cf_bm Value: LkxvOEhDzZaGVHqXHbFoVo0yiklGET6qeNhR5qFf5FU-1663852334-0-AYdny6klY7dYrjPY1GT8Mnjz9eoUKgexJeLzGlfNiQAigi6h1Qdbk60Z8OHEyIq4jqZmiko1N6lhHr6O6x3XvY4MUQ0Uffs0m8dDSoQjEPUQpU9VdtejpfxI9cJxZWZaCA== |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hghasean.com
2606:4700:3035::6815:469a
132a808d419d439858dde238c73f9eed0407392d01c49005dac48794ce7942fe
14832827e45f20f385f3584cb5c84441eb00df1be5aeb33882a5b4ab510ae2ed
1818f0c2ef6a363e915bd4c6c2c2cbeef0fcf60ff2da3e79cfe0d1c3bc9ff86b
203dffbf9fb647ad3576ebc57c4005c1a0cb07cc740a911585b6ba70c8d20892
2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
39459e2db25db3f30b853a7b510629f766994c88eb2af780e77d4ffa71287ee0
41e61b053d86e65e7ca0915bc78a6dd19897375d4f152fa5804bfb3a33ad648c
4a1d51361e6bfabde052f3b64166d7ab532241e0c634162ccd6220c76759642a
4a25afd5419088026f9ca71b22e12a1d59294a1e25c508eaf64328d1dbfa7a98
79befec4b0d6e6e5f9f6ff61ebcd8fe5573397a92fc2c68da2997c1006de7f57
a5ca115514cbfc52924374b62761d7f0d1f8e510d08b32905f75b66b3a37b1e1
e7db92696ed6482339d91808608a969ecff4daaf823bfef600340758cf2d7a1a
eacf2b196015c40a02cf7849c614daaca5205159d7ac234ad90ea47fbb714041
f35b4d8168065dde839d4ebb2bb3747b2734acdf3c85e0c28a163daa97c76d39