registrationusercheck.xyz
Open in
urlscan Pro
2606:4700:3037::681b:b41b
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On August 09 via api from US
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on August 7th 2020. Valid for: a year.
This is the only time registrationusercheck.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2606:4700:303... 2606:4700:3037::681b:b41b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
registrationusercheck.xyz
registrationusercheck.xyz |
212 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | registrationusercheck.xyz |
registrationusercheck.xyz
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-07 - 2021-08-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://registrationusercheck.xyz/224458/ljhodnfngbmvwus/r5o9yitb8zmtk7s/241758037537/zxtq6bhmiw7fnf5/fxr8aaqhyf9p2n3/signin.php?returnuri=ynh9cjr7j2shuiqo1ywad4kmee5xgw&cgi-bin=5naf9sp8kqzzvrlpwbke&webscr_cmd=nzrcaoghv798lovtbklx&account=zfeuplqth2hv5rm9tvyogw1raicndq
Frame ID: 24BD9B245D8838270E880183BC8E6C1F
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
signin.php
registrationusercheck.xyz/224458/ljhodnfngbmvwus/r5o9yitb8zmtk7s/241758037537/zxtq6bhmiw7fnf5/fxr8aaqhyf9p2n3/ |
172 KB 118 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
contextualLogin.css
registrationusercheck.xyz/private/src/css/ |
91 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
registrationusercheck.xyz/private/src/img/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.0.min.js
registrationusercheck.xyz/private/src/js/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
registrationusercheck.xyz/private/src/js/ |
21 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
registrationusercheck.xyz/private/src/js/ |
79 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a.js
registrationusercheck.xyz/private/src/js/ |
62 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signin.js
registrationusercheck.xyz/private/src/js/pages/ |
10 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Popper object| bootstrap object| deployJava function| Detector function| murmurhash3_32_gc object| swfobject function| ClientJS function| UAParser function| stopPrntScr function| AccessClipboardData2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
registrationusercheck.xyz/ | Name: PHPSESSID Value: etsqkpajv6hhppqhs20ids62qa |
|
.registrationusercheck.xyz/ | Name: __cfduid Value: dfcee01242e58c41fd20276e8d2f01dab1597008656 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
registrationusercheck.xyz
2606:4700:3037::681b:b41b
03f5c3670a8445c0af75a1b934be176f6c1cde339fbe76b1062cc51e590bca98
690edd02f32d6fc22a97612a1e49b2e04904681c57761076b98a673d3def714f
7620d69ee0f725e114d37c05153a057ea10026d3d1dc3f8e28ff47a685dc9de2
b1b74d053a175caa1f64015427d814016e132162e30e82bc9b503efca552429b
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
b79dbbfdb8597e26b0dcccbb64147931d192300e481bf9287dc5ca97e06ceb0d
f8b04d7d0ffa250154ae60d768ee00a47235a7014612f7a9a781cd5251be6a53
fe6e42ea2ae2fd5616fd14a48f40e5880f588e4c4b8e9c88b2f762a892ed0178