Submitted URL: http://acruxllc.com/source
Effective URL: http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav...
Submission: On November 05 via manual from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 7 HTTP transactions. The main IP is 192.185.30.229, located in Houston, United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is acruxllc.com.
This is the only time acruxllc.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
2 8 192.185.30.229 46606 (UNIFIEDLA...)
1 2a02:26f0:eb:... 20940 (AKAMAI-ASN1)
7 2
Apex Domain
Subdomains
Transfer
8 acruxllc.com
acruxllc.com
444 KB
1 gfx.ms
auth.gfx.ms
209 B
7 2
Domain Requested by
8 acruxllc.com 2 redirects acruxllc.com
1 auth.gfx.ms acruxllc.com
7 2

This site contains no links.

Subject Issuer Validity Valid
msagfx.live.com
Microsoft IT TLS CA 2
2019-06-13 -
2021-06-13
2 years crt.sh

This page contains 1 frames:

Primary Page: http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: D1C6B94B7E284DEB8718BEF2DC5112A5
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://acruxllc.com/source HTTP 301
    http://acruxllc.com/source/ HTTP 302
    http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

7
Requests

14 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

443 kB
Transfer

693 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://acruxllc.com/source HTTP 301
    http://acruxllc.com/source/ HTTP 302
    http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request o92xnsv8kv1bb5uzzti8p24x.php
acruxllc.com/source/
Redirect Chain
  • http://acruxllc.com/source
  • http://acruxllc.com/source/
  • http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv...
23 KB
9 KB
Document
General
Full URL
http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Server
192.185.30.229 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
fatcowmedia.com
Software
Apache /
Resource Hash
827c3e0c6f7af57b683852165db0f2d4eafe9ace4a079d9dcf4a21d771357895

Request headers

Host
acruxllc.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=33dc89fa66ea8fe0d585d997171237bc
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 05 Nov 2020 08:00:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
8872
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Content-Type
text/html

Redirect headers

Date
Thu, 05 Nov 2020 08:00:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Set-Cookie
PHPSESSID=33dc89fa66ea8fe0d585d997171237bc; path=/
Location
o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4#n=1252899642&fid=1&fav=1
Content-Length
0
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Content-Type
text/html
converged.login.min.css
acruxllc.com/source/files/
84 KB
23 KB
Stylesheet
General
Full URL
http://acruxllc.com/source/files/converged.login.min.css
Requested by
Host: acruxllc.com
URL: http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Server
192.185.30.229 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
fatcowmedia.com
Software
Apache /
Resource Hash
4f962ec8ae085492d496fcbbd74185ab1c8e377438dbcb5ec4f8517b7bd9293f

Request headers

Referer
http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 05 Nov 2020 08:00:14 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Jan 2018 00:21:56 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=72
convergedlogin_pcore.min.js
acruxllc.com/source/files/
284 KB
114 KB
Script
General
Full URL
http://acruxllc.com/source/files/convergedlogin_pcore.min.js
Requested by
Host: acruxllc.com
URL: http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Server
192.185.30.229 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
fatcowmedia.com
Software
Apache /
Resource Hash
a70ad29a8744395014e44502e6cfb13e02569ac519b159ac8c840013e947c7b1

Request headers

Origin
http://acruxllc.com
Referer
http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 05 Nov 2020 08:00:14 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Jan 2018 00:21:58 GMT
Server
Apache
Vary
Accept-Encoding
Upgrade
h2,h2c
Transfer-Encoding
chunked
Connection
Upgrade, Keep-Alive
Accept-Ranges
none
Content-Type
application/javascript
Keep-Alive
timeout=5, max=75
convergedloginpaginatedstrings-en-gb.min.js
acruxllc.com/source/files/
10 KB
4 KB
Script
General
Full URL
http://acruxllc.com/source/files/convergedloginpaginatedstrings-en-gb.min.js
Requested by
Host: acruxllc.com
URL: http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Server
192.185.30.229 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
fatcowmedia.com
Software
Apache /
Resource Hash
76a549b7b5bb871680b150cc933d79b0b12a5b6f58d19348ece542f5d7a4af4c

Request headers

Origin
http://acruxllc.com
Referer
http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 05 Nov 2020 08:00:14 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Jan 2018 00:21:52 GMT
Server
Apache
Vary
Accept-Encoding
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
none
Content-Type
application/javascript
Keep-Alive
timeout=5, max=75
Content-Length
3989
microsoft_logo.svg
auth.gfx.ms/16.000.27621.00/images/
0
209 B
Image
General
Full URL
https://auth.gfx.ms/16.000.27621.00/images/microsoft_logo.svg?x=ee5c8d9fb6248c938fd0dc19370e90bd
Requested by
Host: acruxllc.com
URL: http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:eb:3a4::34ef , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 05 Nov 2020 08:00:14 GMT
PPServer
PPV: 30 H: BL02PFE54DD391D V: 0
Connection
keep-alive
Content-Length
0
Server
Microsoft-IIS/10.0
0-small.jpg
acruxllc.com/source/files/
1 KB
1 KB
Image
General
Full URL
http://acruxllc.com/source/files/0-small.jpg?x=12f4b8b543125cc986c79cd85320812f
Requested by
Host: acruxllc.com
URL: http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Server
192.185.30.229 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
fatcowmedia.com
Software
Apache /
Resource Hash
c13db279143e1845ee4aaee5afedc5bd75e9f7d50024b63883b45332c4960b3b

Request headers

Referer
http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 05 Nov 2020 08:00:14 GMT
Last-Modified
Tue, 16 Jan 2018 00:22:01 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=74
Content-Length
1029
0.jpg
acruxllc.com/source/files/
291 KB
291 KB
Image
General
Full URL
http://acruxllc.com/source/files/0.jpg?x=f5a9a9531b8f4bcc86eabb19472d15d5
Requested by
Host: acruxllc.com
URL: http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Server
192.185.30.229 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
fatcowmedia.com
Software
Apache /
Resource Hash
62faab60433070e2ea52c235f0f18db228759f2a08bb6f9e5711630df8321214

Request headers

Referer
http://acruxllc.com/source/o92xnsv8kv1bb5uzzti8p24x.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=o92xnsv8kv1bb5uzzti8p24x&loginpage=o92xnsv8kv1bb5uzzti8p24x&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 05 Nov 2020 08:00:14 GMT
Last-Modified
Tue, 16 Jan 2018 00:22:01 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=74
Content-Length
298105

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
acruxllc.com/ Name: PHPSESSID
Value: 33dc89fa66ea8fe0d585d997171237bc