amacion-update.1bz9286ek.ga
Open in
urlscan Pro
173.82.219.123
Malicious Activity!
Public Scan
Submission: On July 10 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on July 10th 2022. Valid for: 3 months.
This is the only time amacion-update.1bz9286ek.ga was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 173.82.219.123 173.82.219.123 | 35916 (MULTA-ASN1) (MULTA-ASN1) | |
8 | 1 |
ASN35916 (MULTA-ASN1, US)
PTR: mail.ama-kwej.ga
amacion-update.1bz9286ek.ga |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
1bz9286ek.ga
amacion-update.1bz9286ek.ga |
254 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | amacion-update.1bz9286ek.ga |
amacion-update.1bz9286ek.ga
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
amacion-update.1bz9286ek.ga R3 |
2022-07-10 - 2022-10-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://amacion-update.1bz9286ek.ga/
Frame ID: EEB07FFC73F108389D808A9A9A26DD5E
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
AmazonサインインAmazonDetected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- <[^>]+\sdata-v(?:ue)?-
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
amacion-update.1bz9286ek.ga/ |
1 KB 929 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.78004369.css
amacion-update.1bz9286ek.ga/css/ |
359 KB 71 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.4e77e3b2.js
amacion-update.1bz9286ek.ga/js/ |
333 KB 75 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.516bb86b.js
amacion-update.1bz9286ek.ga/js/ |
272 KB 96 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api_session.php
amacion-update.1bz9286ek.ga/api/ |
87 B 324 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api_session.php
amacion-update.1bz9286ek.ga/api/ |
87 B 166 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jump.php
amacion-update.1bz9286ek.ga/api/ |
2 B 97 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-en.67c9b129.67c9b129.png
amacion-update.1bz9286ek.ga/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| webpackJsonp function| _ boolean| __INTLIFY_PROD_DEVTOOLS__ boolean| __VUE_I18N_FULL_INSTALL__ boolean| __VUE_I18N_LEGACY_API__ boolean| __VUE__1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
amacion-update.1bz9286ek.ga/ | Name: PHPSESSID Value: ih52ulqjebgirkr3bligj5en9v |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amacion-update.1bz9286ek.ga
173.82.219.123
2c96ab51054b8a5dd151bbda33a3531c8df660230457d5e77fb3e66242b0907c
36bae28e1f74c0f72e19be8bde840356fe010fdc42d3fc3bd60a3623cdc62d55
47498d7f84bec590ebf2c3228ae4d557ac8b72ad33cd1b177545fa8db8d2ba70
666c83beac7e0a68b51d8b283cc192fbc1ed1c64e973014ece82c3b85d5875fa
d8463bd3ba4b10e5916f65fa7b0c1f9f91f67ca40cc25b48810fb2f5a3340488
f3278946838f5fd0b259260c16a81bc6fdf2897581f31f5f79c581a149ef6a74
f75a686a6421d9c3b351dbcd4de3a3acd0df2e69eda78d6c4c16980bcbc31406