webmastersecureoffiail.humorkakasusu.com
Open in
urlscan Pro
62.210.53.85
Malicious Activity!
Public Scan
Effective URL: https://webmastersecureoffiail.humorkakasusu.com/ap/signin?session=1c24c95bf1c03d3550ed880dfe7c81c7faeddca5
Submission: On September 06 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on September 6th 2019. Valid for: 3 months.
This is the only time webmastersecureoffiail.humorkakasusu.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 62.210.53.85 62.210.53.85 | 12876 (AS12876) (AS12876) | |
1 | 13.35.250.160 13.35.250.160 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
5 | 2 |
ASN12876 (AS12876, FR)
shortenes.jejemkaka.com | |
webmastersecureoffiail.humorkakasusu.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-13-35-250-160.fra6.r.cloudfront.net
m.media-amazon.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
humorkakasusu.com
webmastersecureoffiail.humorkakasusu.com |
183 KB |
1 |
media-amazon.com
m.media-amazon.com |
28 KB |
1 |
jejemkaka.com
shortenes.jejemkaka.com |
608 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
3 | webmastersecureoffiail.humorkakasusu.com |
shortenes.jejemkaka.com
webmastersecureoffiail.humorkakasusu.com |
1 | m.media-amazon.com | |
1 | shortenes.jejemkaka.com | |
5 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.amazon.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
webmastersecureoffiail.humorkakasusu.com Let's Encrypt Authority X3 |
2019-09-06 - 2019-12-05 |
3 months | crt.sh |
Images-na.ssl-images-amazon.com DigiCert Global CA G2 |
2019-05-02 - 2020-04-23 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://webmastersecureoffiail.humorkakasusu.com/ap/signin?session=1c24c95bf1c03d3550ed880dfe7c81c7faeddca5
Frame ID: BC072B00EDFE1CBD90C687FF1CA6315B
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://shortenes.jejemkaka.com/index.php Page URL
- https://webmastersecureoffiail.humorkakasusu.com/?csjembut Page URL
- https://webmastersecureoffiail.humorkakasusu.com/ap/signin?session=1c24c95bf1c03d3550ed880dfe7c81c7faeddca5 Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Forgot your password?
Search URL Search Domain Scan URL
Title: Create your Amazon account
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://shortenes.jejemkaka.com/index.php Page URL
- https://webmastersecureoffiail.humorkakasusu.com/?csjembut Page URL
- https://webmastersecureoffiail.humorkakasusu.com/ap/signin?session=1c24c95bf1c03d3550ed880dfe7c81c7faeddca5 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.php
shortenes.jejemkaka.com/ |
400 B 608 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
Cookie set
/
webmastersecureoffiail.humorkakasusu.com/ |
121 B 502 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
signin
webmastersecureoffiail.humorkakasusu.com/ap/ |
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
webmastersecureoffiail.humorkakasusu.com/assets/css/ |
173 KB 174 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AmazonUIBaseCSS-sprite_1x-c4a765aedd886dc04d89e7e93b6a02c59ecb7013._V2_.png
m.media-amazon.com/images/G/01/AUIClients/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
number| ue_t01 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
webmastersecureoffiail.humorkakasusu.com/ | Name: PHPSESSID Value: 5626a63e548dd0e700e0930ce919d31d |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
m.media-amazon.com
shortenes.jejemkaka.com
webmastersecureoffiail.humorkakasusu.com
13.35.250.160
62.210.53.85
437e95a363a4291060e34ba170e043274e0155821e9be374f35de3c4f13cbaa5
6b528c74ca5ede9fd5681e95be794e1874cbb6011ec0a2bb8407394965ba84ae
6cbf6a1c5f9f47a221f6d4df4efab8ff0109ba29029a39262b0c573672fb6e9f
c53294daa2b521e9c969be5ad264b0c281463b9a9f0fbe341b802d6485a24d19