biocross.co.za
Open in
urlscan Pro
198.20.83.158
Malicious Activity!
Public Scan
Effective URL: https://biocross.co.za/huhh/cmd-login=fc57e7f7e3afa9af443c1aabe31bde5e/8y4pppgkgoo27ygksl1jktlb.php?rand=13InboxLightas...
Submission: On March 07 via manual from IN
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on February 4th 2019. Valid for: 3 months.
This is the only time biocross.co.za was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 3 | 108.163.233.154 108.163.233.154 | 32475 (SINGLEHOP...) (SINGLEHOP-LLC - SingleHop LLC) | |
3 5 | 198.20.83.158 198.20.83.158 | 32475 (SINGLEHOP...) (SINGLEHOP-LLC - SingleHop LLC) | |
2 | 2a00:1450:400... 2a00:1450:4001:80b::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2606:4700::68... 2606:4700::6813:c697 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 | 2a00:1450:400... 2a00:1450:4001:808::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
8 | 5 |
ASN32475 (SINGLEHOP-LLC - SingleHop LLC, US)
PTR: oak.superdnssite.com
ceaveng.co.za |
ASN32475 (SINGLEHOP-LLC - SingleHop LLC, US)
PTR: oak.superdnssite.com
biocross.co.za |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
biocross.co.za
3 redirects
biocross.co.za |
396 KB |
3 |
ceaveng.co.za
3 redirects
ceaveng.co.za |
1 KB |
2 |
gstatic.com
fonts.gstatic.com |
21 KB |
2 |
googleapis.com
fonts.googleapis.com |
1 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
2 KB |
8 | 5 |
Domain | Requested by | |
---|---|---|
5 | biocross.co.za |
3 redirects
biocross.co.za
|
3 | ceaveng.co.za | 3 redirects |
2 | fonts.gstatic.com |
biocross.co.za
|
2 | fonts.googleapis.com |
biocross.co.za
|
1 | cdnjs.cloudflare.com |
biocross.co.za
|
8 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
biocross.co.za cPanel, Inc. Certification Authority |
2019-02-04 - 2019-05-05 |
3 months | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2019-03-01 - 2019-05-24 |
3 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-03-02 - 2019-09-08 |
6 months | crt.sh |
*.google.com Google Internet Authority G3 |
2019-03-01 - 2019-05-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://biocross.co.za/huhh/cmd-login=fc57e7f7e3afa9af443c1aabe31bde5e/8y4pppgkgoo27ygksl1jktlb.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=70657465722E6A2E6C6176656E6465724062612E636F6D&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: BC7FAE0019E13343285AF1F173802383
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://ceaveng.co.za/mid?email=70657465722E6A2E6C6176656E6465724062612E636F6D
HTTP 301
https://ceaveng.co.za/mid/?email=70657465722E6A2E6C6176656E6465724062612E636F6D HTTP 302
https://ceaveng.co.za/mid/cmd-login=7b26a8bed1524e98354b23208bd1dd4e/?newsid=8168437790ODA0YjZkM2R... HTTP 302
https://biocross.co.za/huhh?email=70657465722E6A2E6C6176656E6465724062612E636F6D HTTP 301
https://biocross.co.za/huhh/?email=70657465722E6A2E6C6176656E6465724062612E636F6D HTTP 302
https://biocross.co.za/huhh/cmd-login=fc57e7f7e3afa9af443c1aabe31bde5e/?email=70657465722E6A2E6C617... HTTP 302
https://biocross.co.za/huhh/cmd-login=fc57e7f7e3afa9af443c1aabe31bde5e/8y4pppgkgoo27ygksl1jktlb.php... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Prefix-Free (Miscellaneous) Expand
Detected patterns
- env /^PrefixFree$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://ceaveng.co.za/mid?email=70657465722E6A2E6C6176656E6465724062612E636F6D
HTTP 301
https://ceaveng.co.za/mid/?email=70657465722E6A2E6C6176656E6465724062612E636F6D HTTP 302
https://ceaveng.co.za/mid/cmd-login=7b26a8bed1524e98354b23208bd1dd4e/?newsid=8168437790ODA0YjZkM2RkMjQ1MDZhMTRiOTlmZTg1NDM1Yzg1YmU=ODA0YjZkM2RkMjQ1MDZhMTRiOTlmZTg1NDM1Yzg1YmU=ODA0YjZkM2RkMjQ1MDZhMTRiOTlmZTg1NDM1Yzg1YmU=&email=70657465722E6A2E6C6176656E6465724062612E636F6D&loginpage=ODA0YjZkM2RkMjQ1MDZhMTRiOTlmZTg1NDM1Yzg1YmU=ODA0YjZkM2RkMjQ1MDZhMTRiOTlmZTg1NDM1Yzg1YmU=&reff=ODA0YjZkM2RkMjQ1MDZhMTRiOTlmZTg1NDM1Yzg1YmU=ODA0YjZkM2RkMjQ1MDZhMTRiOTlmZTg1NDM1Yzg1YmU= HTTP 302
https://biocross.co.za/huhh?email=70657465722E6A2E6C6176656E6465724062612E636F6D HTTP 301
https://biocross.co.za/huhh/?email=70657465722E6A2E6C6176656E6465724062612E636F6D HTTP 302
https://biocross.co.za/huhh/cmd-login=fc57e7f7e3afa9af443c1aabe31bde5e/?email=70657465722E6A2E6C6176656E6465724062612E636F6D&loginpage=&reff=Zjc0MzQ0ZDg2ZjU1ZDUwYmE4N2U2YTQ0YzEyODhiOGI= HTTP 302
https://biocross.co.za/huhh/cmd-login=fc57e7f7e3afa9af443c1aabe31bde5e/8y4pppgkgoo27ygksl1jktlb.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=70657465722E6A2E6C6176656E6465724062612E636F6D&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
8y4pppgkgoo27ygksl1jktlb.php
biocross.co.za/huhh/cmd-login=fc57e7f7e3afa9af443c1aabe31bde5e/ Redirect Chain
|
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
3 KB 523 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
prefixfree.min.js
cdnjs.cloudflare.com/ajax/libs/prefixfree/1.0.7/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
8 KB 741 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
office.png
biocross.co.za/huhh/cmd-login=fc57e7f7e3afa9af443c1aabe31bde5e/images/ |
391 KB 391 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4UaOrEtFpBISc36j2jDu5w.woff2
fonts.gstatic.com/s/exo/v8/ |
10 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4UaDrEtFpBIavF-29xLjza_B4g.woff2
fonts.gstatic.com/s/exo/v8/ |
10 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cdnjs.cloudflare.com
- URL
- http://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| StyleFix object| PrefixFree0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
biocross.co.za
cdnjs.cloudflare.com
ceaveng.co.za
fonts.googleapis.com
fonts.gstatic.com
cdnjs.cloudflare.com
108.163.233.154
198.20.83.158
2606:4700::6813:c697
2a00:1450:4001:808::2003
2a00:1450:4001:80b::200a
182a9b0563d110236aa8c9743f738d508cc2bf306a47b3081a7cdb4b2bc6b661
19a28e2d74e7eee25716e5a9e7bba44191ae28ada05995a5107d7a85cea3054f
6c6aa561e803af5d46246dd87aa775ab6eeb3c7f44565c1cac75c77d50469fd7
75344374de853defd947c5ec23ae6aa3009f0cdd1c9d2362670c5cb93838814c
c022c8f9656cc924db2e6f93ab3125e574a1ff3e3f6c871ad963f9c7051b44b5
e3ba4948ffb68530af5c28e08432b206bd71955b4ae3d0836b02dc30550a68d9
f71636845f6875c1bffa36536d832658abcfd815e3f6fce28d13d31eae8df2cd