dmarket.comlosmite.com
Open in
urlscan Pro
188.114.96.3
Malicious Activity!
Public Scan
Submission: On May 30 via manual from SI — Scanned from NL
Summary
TLS certificate: Issued by GTS CA 1P5 on May 29th 2024. Valid for: 3 months.
This is the only time dmarket.comlosmite.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Steam (Gaming)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 188.114.96.3 188.114.96.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700:303... 2606:4700:3031::ac43:bf45 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 172.67.191.69 172.67.191.69 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
demstafer.com
demstafer.com |
2 KB |
2 |
comlosmite.com
dmarket.comlosmite.com |
544 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
8 | demstafer.com |
dmarket.comlosmite.com
|
2 | dmarket.comlosmite.com |
dmarket.comlosmite.com
|
10 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
store.steampowered.com |
steamcommunity.com |
help.steampowered.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
comlosmite.com GTS CA 1P5 |
2024-05-29 - 2024-08-27 |
3 months | crt.sh |
demstafer.com E1 |
2024-05-03 - 2024-08-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dmarket.comlosmite.com/jsuxmuag7un5.html
Frame ID: 47D7DD41A42623C32E51221CCA88BC68
Requests: 13 HTTP requests in this frame
7 Outgoing links
These are links going to different origins than the main page.
Title: WINKEL
Search URL Search Domain Scan URL
Title: COMMUNITY
Search URL Search Domain Scan URL
Title: INFO
Search URL Search Domain Scan URL
Title: ONDERSTEUNING
Search URL Search Domain Scan URL
Title: Help, ik kan niet inloggen
Search URL Search Domain Scan URL
Title: mobiele Steam-app
Search URL Search Domain Scan URL
Title: Lid worden van Steam
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
jsuxmuag7un5.html
dmarket.comlosmite.com/ |
51 KB 30 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
f1pbnyrx0glj.js
dmarket.comlosmite.com/ |
1 MB 515 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
dtyailsvfomiwqoxiomdqqmgdxiazdwpsdnpiribiuhgpn
demstafer.com/ |
57 B 389 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
dtyailsvfomiwqoxiomdqqmgdxiazdwpsdnpiribiuhgpn
demstafer.com/ |
0 0 |
Preflight
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
291 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
61 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
122 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
33 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
csmehovwemkncdxxk
demstafer.com/ |
71 B 558 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
csmehovwemkncdxxk
demstafer.com/ |
0 0 |
Preflight
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
clfghrngesehcfsvk
demstafer.com/ |
12 B 501 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
clfghrngesehcfsvk
demstafer.com/ |
0 0 |
Preflight
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
cjwghqiselsjcdjsk
demstafer.com/ |
0 0 |
Preflight
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
cjwghqiselsjcdjsk
demstafer.com/ |
12 B 502 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Steam (Gaming)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| m0_0x5840 function| m0_0xbd1e function| _ function| cl0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
demstafer.com
dmarket.comlosmite.com
172.67.191.69
188.114.96.3
2606:4700:3031::ac43:bf45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