webmastersecureoffiail.humorkakasusu.com
Open in
urlscan Pro
62.210.53.85
Malicious Activity!
Public Scan
Effective URL: https://webmastersecureoffiail.humorkakasusu.com/ap/signin?session=b210a2b202dde5f91b9e1247a742bfb0e635a88c
Submission: On September 06 via api from BE
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on September 6th 2019. Valid for: 3 months.
This is the only time webmastersecureoffiail.humorkakasusu.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.31.90.45 52.31.90.45 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
4 | 62.210.53.85 62.210.53.85 | 12876 (AS12876) (AS12876) | |
1 | 13.35.250.160 13.35.250.160 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
5 | 2 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: www.qrstuff.com
qrs.ly |
ASN12876 (AS12876, FR)
shortenes.jejemkaka.com | |
webmastersecureoffiail.humorkakasusu.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-13-35-250-160.fra6.r.cloudfront.net
m.media-amazon.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
humorkakasusu.com
webmastersecureoffiail.humorkakasusu.com |
183 KB |
1 |
media-amazon.com
m.media-amazon.com |
28 KB |
1 |
jejemkaka.com
shortenes.jejemkaka.com |
608 B |
1 |
qrs.ly
1 redirects
qrs.ly |
494 B |
5 | 4 |
Domain | Requested by | |
---|---|---|
3 | webmastersecureoffiail.humorkakasusu.com |
shortenes.jejemkaka.com
webmastersecureoffiail.humorkakasusu.com |
1 | m.media-amazon.com | |
1 | shortenes.jejemkaka.com | |
1 | qrs.ly | 1 redirects |
5 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.amazon.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
webmastersecureoffiail.humorkakasusu.com Let's Encrypt Authority X3 |
2019-09-06 - 2019-12-05 |
3 months | crt.sh |
Images-na.ssl-images-amazon.com DigiCert Global CA G2 |
2019-05-02 - 2020-04-23 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://webmastersecureoffiail.humorkakasusu.com/ap/signin?session=b210a2b202dde5f91b9e1247a742bfb0e635a88c
Frame ID: 973D916ACDC6DF58DF74AEE9C8867914
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://qrs.ly/ygajo0o
HTTP 302
http://shortenes.jejemkaka.com/index.php Page URL
- https://webmastersecureoffiail.humorkakasusu.com/?csjembut Page URL
- https://webmastersecureoffiail.humorkakasusu.com/ap/signin?session=b210a2b202dde5f91b9e1247a742bfb0e635a88c Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Passwort vergessen
Search URL Search Domain Scan URL
Title: Erstellen Sie Ihr Amazon-Konto
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://qrs.ly/ygajo0o
HTTP 302
http://shortenes.jejemkaka.com/index.php Page URL
- https://webmastersecureoffiail.humorkakasusu.com/?csjembut Page URL
- https://webmastersecureoffiail.humorkakasusu.com/ap/signin?session=b210a2b202dde5f91b9e1247a742bfb0e635a88c Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://qrs.ly/ygajo0o HTTP 302
- http://shortenes.jejemkaka.com/index.php
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.php
shortenes.jejemkaka.com/ Redirect Chain
|
400 B 608 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
Cookie set
/
webmastersecureoffiail.humorkakasusu.com/ |
121 B 502 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
signin
webmastersecureoffiail.humorkakasusu.com/ap/ |
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
webmastersecureoffiail.humorkakasusu.com/assets/css/ |
173 KB 174 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AmazonUIBaseCSS-sprite_1x-c4a765aedd886dc04d89e7e93b6a02c59ecb7013._V2_.png
m.media-amazon.com/images/G/01/AUIClients/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
number| ue_t01 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
webmastersecureoffiail.humorkakasusu.com/ | Name: PHPSESSID Value: 201243916d275ff6900facc14bd6416a |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
m.media-amazon.com
qrs.ly
shortenes.jejemkaka.com
webmastersecureoffiail.humorkakasusu.com
13.35.250.160
52.31.90.45
62.210.53.85
2e757062a4a2f0e483f8db4bc61b858a535a189711be988f537dc569544cd166
437e95a363a4291060e34ba170e043274e0155821e9be374f35de3c4f13cbaa5
921b94806e3eaf83a6cb7a2eb088ec2c3fb4c9332212a79726d5e9a8870ca025
bb2eec858b1c5229c11ea42e96f2ceb67060d7549ca75bee9915cd64363d7b24
c53294daa2b521e9c969be5ad264b0c281463b9a9f0fbe341b802d6485a24d19