www.apple.fceld.cn
Open in
urlscan Pro
154.209.4.201
Malicious Activity!
Public Scan
Effective URL: https://www.apple.fceld.cn/f2gxv1yi0ihxbub6it1i.asp?f2gxv1yi0ihxbub6it1i
Submission: On May 03 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G1 on April 30th 2019. Valid for: a year.
This is the only time www.apple.fceld.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 16 | 154.209.4.201 154.209.4.201 | 133115 (HKKFGL-AS...) (HKKFGL-AS-AP HK Kwaifong Group Limited) | |
14 | 1 |
ASN133115 (HKKFGL-AS-AP HK Kwaifong Group Limited, HK)
www.apple.fceld.cn |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
fceld.cn
2 redirects
www.apple.fceld.cn |
250 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
16 | www.apple.fceld.cn |
2 redirects
www.apple.fceld.cn
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.apple.creld.cn Encryption Everywhere DV TLS CA - G1 |
2019-04-30 - 2020-04-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.apple.fceld.cn/f2gxv1yi0ihxbub6it1i.asp?f2gxv1yi0ihxbub6it1i
Frame ID: A9839225D4B13EF31D1187476735BFD1
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://www.apple.fceld.cn/ Page URL
-
https://www.apple.fceld.cn/ios2
HTTP 301
https://www.apple.fceld.cn/ios2/ Page URL
-
https://www.apple.fceld.cn/index_dnacn.asp
HTTP 302
https://www.apple.fceld.cn/f2gxv1yi0ihxbub6it1i.asp?f2gxv1yi0ihxbub6it1i Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /IIS(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.apple.fceld.cn/ Page URL
-
https://www.apple.fceld.cn/ios2
HTTP 301
https://www.apple.fceld.cn/ios2/ Page URL
-
https://www.apple.fceld.cn/index_dnacn.asp
HTTP 302
https://www.apple.fceld.cn/f2gxv1yi0ihxbub6it1i.asp?f2gxv1yi0ihxbub6it1i Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://www.apple.fceld.cn/ios2 HTTP 301
- https://www.apple.fceld.cn/ios2/
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
www.apple.fceld.cn/ |
1 KB 895 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
/
www.apple.fceld.cn/ios2/ Redirect Chain
|
1 KB 904 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
f2gxv1yi0ihxbub6it1i.asp
www.apple.fceld.cn/ Redirect Chain
|
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dncn1.js
www.apple.fceld.cn/Content/ |
26 KB 9 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwindex.css
www.apple.fceld.cn/Content/css/ |
1 KB 999 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwstylel.css
www.apple.fceld.cn/Content/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwbbb.css
www.apple.fceld.cn/Content/css/ |
863 B 729 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwbg.png
www.apple.fceld.cn/Content/img/ |
211 KB 211 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwan.png
www.apple.fceld.cn/Content/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwpg.png
www.apple.fceld.cn/Content/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwyun.png
www.apple.fceld.cn/Content/img/ |
803 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwwenh.png
www.apple.fceld.cn/Content/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwdivbg.png
www.apple.fceld.cn/Content/img/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wzwx.png
www.apple.fceld.cn/Content/img/ |
232 B 477 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| XOR object| STR function| performPage string| strHTML function| checkinput function| myCheckbox1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.apple.fceld.cn/ | Name: ASPSESSIONIDQGRSRACR Value: IBNJOMOBBLJNPHECLFMPPNMG |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.apple.fceld.cn
154.209.4.201
068adcad9990d8f5f40839f09c71554ab7f712d32e56b993b0e96c26ddff2099
1e849c49ed6a18756e0f80dc1efda81e3d3b14eb923317b62db732c5aff10ba0
322282e47d8552a0feabcfe595ca44c3afb82c5147f45416fa008af86e3cf515
35512d22f74580c84dfb7b116bb37020581a2fb9a95b5740a89e0a65100d63ef
3a3214b501fe041d89edfae0ac654c684556aadaf2865f330bb8c3e194379bff
4b6dd2f5058afb571c10ebfda119e9d6283a77998b2b84785bdbfe38e3f3b18a
4e3b5031895c71568db44c70a92e9d6585344692a8564c4348a4415769090e7e
5132ea5953736512875a3d5ec80ea09aa7172c28753884deb428628328eb6e40
5f2e1ff82606b620ba956f23570281305159f08dc1eb098492f7432c5d59959a
7c32d97d72a64609c88ad87b22f98851636019f086f74b4451fb67d43b1c95ad
7fbb03cd6ff7edc634de048f072e0af4a037690727804c1f206c323a914e3806
b3d98c4c8aa4055992854cedc838d36b8970d5c1c9030936d206d2dd31f44428
b50a4eab0e909a7938dd530dfec84b85bcae858b549d5b4ed1fe889931ede65e
f6bc4f92d614acc4a11c691cf58ac2a928fcf9012e4ff7aac9c18ae0795bce75