www.k-oktyabr.ru
Open in
urlscan Pro
194.63.140.119
Malicious Activity!
Public Scan
Submission: On March 06 via api from CA
Summary
This is the only time www.k-oktyabr.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Etisalat (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 13 | 194.63.140.119 194.63.140.119 | 50113 (SUPERSERV...) (SUPERSERVERSDATACENTER) | |
13 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
k-oktyabr.ru
1 redirects
www.k-oktyabr.ru |
265 KB |
0 |
Failed
function sub() { [native code] }. Failed |
|
13 | 2 |
Domain | Requested by | |
---|---|---|
13 | www.k-oktyabr.ru |
1 redirects
www.k-oktyabr.ru
|
0 | scrapbook Failed |
www.k-oktyabr.ru
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://www.k-oktyabr.ru/eim.ae/
Frame ID: CC9E2E7DBB0511A256D452AABFDA535D
Requests: 12 HTTP requests in this frame
Frame:
http://www.k-oktyabr.ru/eim.ae/index_1.html
Frame ID: 99C9D3B43A0F80034F6B52D31F4AF420
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.k-oktyabr.ru/eim.ae
HTTP 301
http://www.k-oktyabr.ru/eim.ae/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.k-oktyabr.ru/eim.ae
HTTP 301
http://www.k-oktyabr.ru/eim.ae/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.k-oktyabr.ru/eim.ae/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
www.k-oktyabr.ru/eim.ae/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dojo.css
www.k-oktyabr.ru/eim.ae/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dijit.css
www.k-oktyabr.ru/eim.ae/ |
33 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dijit_rtl.css
www.k-oktyabr.ru/eim.ae/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Button.css
www.k-oktyabr.ru/eim.ae/ |
4 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DropDownSelect.css
www.k-oktyabr.ru/eim.ae/ |
8 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index_1.html
www.k-oktyabr.ru/eim.ae/ Frame 99C9 |
144 B 409 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
www.k-oktyabr.ru/eim.ae/ |
194 KB 194 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mail.jpg
www.k-oktyabr.ru/eim.ae/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
greyband.jpg
www.k-oktyabr.ru/eim.ae/ |
458 B 710 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
info.png
scrapbook:download:error:https://acm2.eim.ae/iwc_static/c11n/allDomain/layout/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buttonEnabled.png
www.k-oktyabr.ru/eim.ae/ |
120 B 370 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- scrapbook
- URL
- urn:scrapbook:download:error:https://acm2.eim.ae/iwc_static/c11n/allDomain/layout/images/info.png?3.0.0.0.1_015148
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Etisalat (Telecommunication)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
scrapbook
www.k-oktyabr.ru
scrapbook
194.63.140.119
032d7b335e262e88896a199e92afeb10330cdb4296b6aa2027a68218de500444
04e70ab858827b00014d117cbf1fd7d83521783f25c4a151f27ad6132ac97f3b
1aa40741103cc2ceb4542fbc06dbb3f1222600e85366e4f4efb4370af7878d68
1fab06deb73e4973a5af4f87e9d7bf33d200fa479674ab2bd6843818f3355147
390d21b471d2a4cd63ca6d0434b42939a473732debf4ce5adbacac52af5a4e9f
5720a88b6ca21a29baad9f91418ebcda58ad8fc3fb7b4525e8c72ab638e7b5f8
64f1cbe67c89a17b9eea56bc7f3152ea647d0e7ad86ae87f458ad64b447aede2
7ad7c5f2a4f8e75a322bcc9e2e4430b6841be4fd266c15e959455a2958eb2a4b
b19cbd41004448903bfe87169e69e3dae426d067d6803e80cf790fbd95c52211
b26e0b522fcb9c25f854e4717d6021dd3701b3718a098c0bd2597b159b13a370
e4574f72bcc0faf097629446e330891af258fa805dd5fff4e893e8676fb4b190
efcc24c74e46e1713b4a09274a3bf8cde8db3c3ae3c5b3f212f6a9f902bf59c8