mstr-x2.net
Open in
urlscan Pro
104.21.63.111
Malicious Activity!
Public Scan
Submission Tags: @phish_report
Submission: On March 16 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by GTS CA 1P5 on March 7th 2024. Valid for: 3 months.
This is the only time mstr-x2.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 104.21.63.111 104.21.63.111 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
mstr-x2.net
mstr-x2.net |
57 KB |
4 | 1 |
Domain | Requested by | |
---|---|---|
4 | mstr-x2.net |
mstr-x2.net
|
4 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mstr-x2.net GTS CA 1P5 |
2024-03-07 - 2024-06-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mstr-x2.net/
Frame ID: 46B60498982E2662B2FA54452202BEF1
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
mstr-x2.netPage URL History Show full URLs
- https://mstr-x2.net/ Page URL
- https://mstr-x2.net/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://mstr-x2.net/ Page URL
- https://mstr-x2.net/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
mstr-x2.net/ |
729 B 855 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aes.js
mstr-x2.net/ |
25 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
mstr-x2.net/ |
115 KB 49 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
verification
mstr-x2.net/api/ |
216 B 645 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
March 16th 2024, 11:17:35 pm
UTC —
From Netherlands
Threats:
Social Engineering
Phishing
Scam
Comment: Social engineering scam site impersonates Microstrategy CEO Michael Saylor, and disguising a crypto investment event, with the site URL text or QR code on YouTube live streaming.
https://bafybeidinghwj4rul2az32htteakpsticqnxjx7gxapyj5hxbj54pz4t5m.ipfs.w3s.link/mstr-x2.net.pdf
https://bafybeig5bibhl7dp67rpgqt3gcbmidcfzdtmpfsv3nhpomtydzsbdrlsbm.ipfs.w3s.link/v%3DSgBhsji9q2Q.pdf
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| __VUE_INSTANCE_SETTERS__ object| __VUE_SSR_SETTERS__ boolean| __VUE__1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mstr-x2.net/ | Name: 0x Value: 8729c78b86b5c412a95b6e2fc9e8b90e |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mstr-x2.net
104.21.63.111
0f92c6218f17f803107f08b9461fc6156e3d7e928f720183515f4ce40a9c86a3
6b4d24ca087da483290e3618ff83b9c347655ce8b76240f38b8fb170decfe58f
991fa3ac0febff65dd238aa07315e6ccb792fb207828b371de8cb353bd4dd121
a9970fbd705aa67e912215cfc159d9b4eeda438854fa5f7841a3d5d6671aa0fd