nichasburger.com
Open in
urlscan Pro
167.250.212.20
Malicious Activity!
Public Scan
Effective URL: https://nichasburger.com/new/mad/invest/strong/approved/yu47nnrsojafkfqb8i2kifwjzt.php?a=d2lsbGlhbS5zZWRAd2VmLmNvbQ==&.ve...
Submission: On March 22 via manual from HK
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on March 1st 2020. Valid for: 3 months.
This is the only time nichasburger.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 167.250.212.20 167.250.212.20 | 264658 (MY-TEC S.A.) (MY-TEC S.A.) | |
1 | 70.32.66.129 70.32.66.129 | 31815 (MEDIATEMPLE) (MEDIATEMPLE) | |
6 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
nichasburger.com
1 redirects
nichasburger.com |
1 MB |
1 |
wef.com
wef.com |
111 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
6 | nichasburger.com |
1 redirects
nichasburger.com
|
1 | wef.com |
nichasburger.com
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
nichasburger.com cPanel, Inc. Certification Authority |
2020-03-01 - 2020-05-30 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://nichasburger.com/new/mad/invest/strong/approved/yu47nnrsojafkfqb8i2kifwjzt.php?a=d2lsbGlhbS5zZWRAd2VmLmNvbQ==&.verify?service=nfpb=true&_pageLabel=smep_portal_page_login&timedOut=true&_nfls&c=&i=0&false=d2lsbGlhbS5zZWRAd2VmLmNvbQ==&loginID=&.
Frame ID: 52A72370D5FBDA8AF8583352A8CDFF9E
Requests: 2 HTTP requests in this frame
Frame:
https://nichasburger.com/new/mad/invest/strong/approved/ova.php?a=d2lsbGlhbS5zZWRAd2VmLmNvbQ==&i=0&c=
Frame ID: DC27BBBA17ABB6D683CC68EADAB440A4
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://nichasburger.com/new/mad/invest/strong/approved/index.php?x=x&a=william.sed@wef.com
HTTP 302
https://nichasburger.com/new/mad/invest/strong/approved/yu47nnrsojafkfqb8i2kifwjzt.php?a=d2lsbGlhbS5z... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://nichasburger.com/new/mad/invest/strong/approved/index.php?x=x&a=william.sed@wef.com
HTTP 302
https://nichasburger.com/new/mad/invest/strong/approved/yu47nnrsojafkfqb8i2kifwjzt.php?a=d2lsbGlhbS5zZWRAd2VmLmNvbQ==&.verify?service=nfpb=true&_pageLabel=smep_portal_page_login&timedOut=true&_nfls&c=&i=0&false=d2lsbGlhbS5zZWRAd2VmLmNvbQ==&loginID=&. Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
yu47nnrsojafkfqb8i2kifwjzt.php
nichasburger.com/new/mad/invest/strong/approved/ Redirect Chain
|
925 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ova.php
nichasburger.com/new/mad/invest/strong/approved/ Frame DC27 |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.jpg
nichasburger.com/new/mad/invest/strong/approved/ico/bg/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
nichasburger.com/new/mad/invest/strong/approved/css/ Frame DC27 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js.js
nichasburger.com/new/mad/invest/strong/approved/ico/ Frame DC27 |
6 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
wef.com/ Frame DC27 |
111 KB 111 KB |
Image
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
nichasburger.com/ | Name: PHPSESSID Value: 8c5f6971e16f3df1f564782708065989 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
nichasburger.com
wef.com
167.250.212.20
70.32.66.129
19b8cff9c08e4c42c60b82d6259a56711e0e3ebc40085ab86ec01c2d70995114
1bcbd711541fce74fc4c58fce450956c507db9e1e9d83af8f13ed448e114f9a0
88baf40feb43463a8f6aa6543e88bdbe33f0db9a317486e786eee1e5c76a9544
8d0a07c3daf68b00228add915b2880992aaf0f15e694e3764b35c87aee7a16fc
a6baa596c961ffab09d260ba7d7c743114ff7016e13e853b9b0f25bceac17255