9uii.yjhgenhmg.com Open in urlscan Pro
2606:4700:3036::ac43:97a7  Malicious Activity! Public Scan

URL: https://9uii.yjhgenhmg.com/0HgUXo/
Submission Tags: falconsandbox
Submission: On November 07 via api from US — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 2606:4700:3036::ac43:97a7, located in United States and belongs to CLOUDFLARENET, US. The main domain is 9uii.yjhgenhmg.com.
TLS certificate: Issued by WE1 on October 31st 2024. Valid for: 3 months.
This is the only time 9uii.yjhgenhmg.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Google (Online)

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a04:4e42::649 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
4 4
Apex Domain
Subdomains
Transfer
2 yjhgenhmg.com
9uii.yjhgenhmg.com
20 KB
1 googleusercontent.com
blogger.googleusercontent.com — Cisco Umbrella Rank: 10512
86 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 791
31 KB
4 3
Domain Requested by
2 9uii.yjhgenhmg.com
1 blogger.googleusercontent.com 9uii.yjhgenhmg.com
1 code.jquery.com 9uii.yjhgenhmg.com
4 3

This site contains no links.

Subject Issuer Validity Valid
yjhgenhmg.com
WE1
2024-10-31 -
2025-01-29
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh
*.googleusercontent.com
WR2
2024-10-07 -
2024-12-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://9uii.yjhgenhmg.com/0HgUXo/
Frame ID: 053FEE3205CC64811FA63E2C5CE37C71
Requests: 5 HTTP requests in this frame

Screenshot

Page Title


Detected technologies

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

100 %
HTTPS

100 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

136 kB
Transfer

244 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
9uii.yjhgenhmg.com/0HgUXo/
63 KB
19 KB
Document
General
Full URL
https://9uii.yjhgenhmg.com/0HgUXo/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::ac43:97a7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bf7315e017ad965ac30e12a998bd2b23d82cf36742f4c3ccba7b36ad1c19c3df

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=86400
cache-control
no-cache, private
cf-cache-status
DYNAMIC
cf-ray
8def03df591dd350-FRA
content-encoding
zstd
content-type
text/html; charset=UTF-8
date
Thu, 07 Nov 2024 17:24:08 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1pVtQL%2BEAbIyxnbb8cdH85sblUgfT9tTjYAvM7n7FmcL%2BxLmauglI0HntsHF8QeSxLBqFuPY%2BlSz0LT%2B7KKSqm3KXfNQ1GeDd3NrQclcM%2BQdZYZ2lEqvdfxZkEuPtg%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=TCP&rtt=7720&sent=218&recv=112&lost=0&retrans=1&sent_bytes=247089&recv_bytes=20970&delivery_rate=28174109&cwnd=254&unsent_bytes=0&cid=6152f9bab2d3045b&ts=298575&x=0" cfL4;desc="?proto=TCP&rtt=77412&sent=9&recv=11&lost=0&retrans=0&sent_bytes=4015&recv_bytes=2299&delivery_rate=38584&cwnd=253&unsent_bytes=0&cid=e731a4bc6558c5ec&ts=870&x=0"
vary
accept-encoding
jquery-3.6.0.min.js
code.jquery.com/
87 KB
31 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: 9uii.yjhgenhmg.com
URL: https://9uii.yjhgenhmg.com/0HgUXo/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://9uii.yjhgenhmg.com/

Response headers

content-encoding
gzip
etag
W/"28feccc0-15d9d"
age
4951706
x-cache
HIT, HIT
date
Thu, 07 Nov 2024 17:24:10 GMT
content-type
application/javascript; charset=utf-8
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
x-cache-hits
348172, 360031
x-served-by
cache-lga21931-LGA, cache-mad2200088-MAD
vary
Accept-Encoding
cache-control
public, max-age=31536000, stale-while-revalidate=604800
x-timer
S1731000250.407750,VS0,VE0
cross-origin-resource-policy
cross-origin
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
access-control-allow-origin
*
content-length
30875
server
nginx
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
93eb80dc01e920eaa7f23f998f67e5a5fc55e02b8e66bd3d8f5fef097d88565f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
userinter.png
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZ...
86 KB
86 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZX0EtxoLPSBWR6WwhXZglXIvWXbh24ojuyofD6htY8D4/s3396/userinter.png
Requested by
Host: 9uii.yjhgenhmg.com
URL: https://9uii.yjhgenhmg.com/0HgUXo/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
fbbbc78e85dfa4f2b390e6dc2f3850d0f5247d16b5fd525093331572aa79ae84
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://9uii.yjhgenhmg.com/

Response headers

access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
etag
"v367e"
x-content-type-options
nosniff
expires
Fri, 08 Nov 2024 17:24:11 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
87859
date
Thu, 07 Nov 2024 17:24:11 GMT
x-xss-protection
0
content-type
image/png
vary
Origin
server
fife
content-disposition
inline;filename="userinter.png"
favicon.ico
9uii.yjhgenhmg.com/
0
609 B
Other
General
Full URL
https://9uii.yjhgenhmg.com/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::ac43:97a7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://9uii.yjhgenhmg.com/0HgUXo/

Response headers

cache-control
max-age=14400
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-encoding
zstd
cf-cache-status
HIT
age
3832
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zti%2FHvEfhrEqI6nyu%2Bo7E8HLrZyIBMh2ktKPSsxNJ0D00OJ5TuUNkmEwFQ8jbwza8iHNo3r%2BO13pp22xBNbMCwxt3%2FoeU2ZIy3lDvMMW%2BUixpgntM739Mk6TaWFB3A%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
8def040cefb9d350-FRA
alt-svc
h3=":443"; ma=86400
server-timing
cfL4;desc="?proto=TCP&rtt=1689&sent=213&recv=92&lost=0&retrans=0&sent_bytes=235313&recv_bytes=24901&delivery_rate=28882606&cwnd=257&unsent_bytes=0&cid=eb54ce968492d748&ts=1374651&x=0", cfL4;desc="?proto=TCP&rtt=75855&sent=33&recv=18&lost=0&retrans=0&sent_bytes=23785&recv_bytes=3059&delivery_rate=297000&cwnd=257&unsent_bytes=0&cid=e731a4bc6558c5ec&ts=7805&x=0"
date
Thu, 07 Nov 2024 17:24:15 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
server
cloudflare

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Google (Online)

15 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| pcXfxPCwnw function| $ function| jQuery function| isNumber number| anwser function| loadCaptcha function| verifyCaptcha function| onCheckboxClick function| getRandomInt function| drawRandomLines function| drawRandomDots function| drawRandomEllipses function| drawCaptchaText function| drawCaptcha function| oEOPJmGGJU

2 Cookies

Domain/Path Name / Value
9uii.yjhgenhmg.com/ Name: XSRF-TOKEN
Value: eyJpdiI6IjNva2hEb2lRNjJrYkx2NjA0REFzbEE9PSIsInZhbHVlIjoiT0lyZGxIOFFTZVJONlVhRWVkb0NtUWZWY3hlZ3RHZXphUnZsVjUyeHpYdGFUNDFtemdRZ2ZvSzhRTFZrdk9oZTBUU1VId2RveERhSk80YTV6Q09wZ01NcmF4bVAzWVdLR2NiQkdwcURDQVFCNEFKcjRPWEpJUHhNdlp6SlYreFQiLCJtYWMiOiI5ZWI2MDQ4NGVjYzVjZWYzODc4NzRmYzU4ODVlZWEyZmEzNzdkYmRjNzNjZTMyNWVmZGIzZDRlNTI2YWFlMTUwIiwidGFnIjoiIn0%3D
9uii.yjhgenhmg.com/ Name: laravel_session
Value: eyJpdiI6InRqalJXR0JHMFlnVXc5bzA3MHZTNXc9PSIsInZhbHVlIjoiSFpBVGt2eFcrMlJpMUhvWlpBN084UDdCZlVpeHNYUXBBbEdjSDBmZTE4ekZYY3hleTZnR2dqaXlOSG1nZkFMYjlTdUtMZ0dxb0M0VEFGV0FBUWNwV0xMa0xXMDJOUzZJTG9ZbVFaOUlKOHVMTXJ1Zkhwb216VU5IWXlqbVBMKy8iLCJtYWMiOiI2OWIwZmVhZjQxYzZmZTJhMDRmMjYwZDAyMTkzNzM2YzI2ODdmMDBmZGUwMWJlZjQ3YWM4YWJiNDE3MDI4Yjk4IiwidGFnIjoiIn0%3D

3 Console Messages

Source Level URL
Text
javascript warning URL: https://9uii.yjhgenhmg.com/0HgUXo/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://9uii.yjhgenhmg.com/0HgUXo/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
network error URL: https://9uii.yjhgenhmg.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()