URL: https://benjaziamed.tn/support/exchange/index.php?m=brandy.hayes@cerner.com
Submission: On March 04 via manual from US

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 3 HTTP transactions. The main IP is 107.189.162.104, located in Phoenix, United States and belongs to IOFLOOD, US. The main domain is benjaziamed.tn.
TLS certificate: Issued by cPanel, Inc. Certification Authority on March 1st 2020. Valid for: 3 months.
This is the only time benjaziamed.tn was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 107.189.162.104 53755 (IOFLOOD)
1 2606:4700:20:... 13335 (CLOUDFLAR...)
2 3 162.221.187.186 33182 (DIMENOC)
3 3
Apex Domain
Subdomains
Transfer
3 hostdmg.com.br
hostdmg.com.br
348 B
1 aframe.io
aframe.io
269 KB
1 benjaziamed.tn
benjaziamed.tn
785 B
3 3
Domain Requested by
3 hostdmg.com.br 2 redirects benjaziamed.tn
1 aframe.io benjaziamed.tn
1 benjaziamed.tn
3 3

This site contains no links.

Subject Issuer Validity Valid
benjaziamed.tn
cPanel, Inc. Certification Authority
2020-03-01 -
2020-05-30
3 months crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2019-11-16 -
2020-10-09
a year crt.sh
hostdmg.com.br
cPanel, Inc. Certification Authority
2020-02-25 -
2020-05-25
3 months crt.sh

This page contains 2 frames:

Primary Page: https://benjaziamed.tn/support/exchange/index.php?m=brandy.hayes@cerner.com
Frame ID: 06C144C0E4054AB880A0807DBD0B31A7
Requests: 2 HTTP requests in this frame

Frame: https://hostdmg.com.br/index/portal/pit6cs7w7kpaau3erbtdku09.php?GiJ64F15833591511850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc&email=&error=
Frame ID: 2634502A3C876B40C58DCD6BADDD34AE
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • html /<a-scene[^<>]*>/i
  • script /\/?([\d.]+)?\/aframe(?:\.min)?\.js/i

Overall confidence: 100%
Detected patterns
  • html /<a-scene[^<>]*>/i
  • script /\/?([\d.]+)?\/aframe(?:\.min)?\.js/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

1
Countries

270 kB
Transfer

1083 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://hostdmg.com.br/index/portal HTTP 301
  • https://hostdmg.com.br/index/portal/ HTTP 302
  • https://hostdmg.com.br/index/portal/pit6cs7w7kpaau3erbtdku09.php?GiJ64F15833591511850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc&email=&error=

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request index.php
benjaziamed.tn/support/exchange/
797 B
785 B
Document
General
Full URL
https://benjaziamed.tn/support/exchange/index.php?m=brandy.hayes@cerner.com
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.189.162.104 Phoenix, United States, ASN53755 (IOFLOOD, US),
Reverse DNS
we.love.servers.at.ioflood.net
Software
Apache / PHP/7.3.14
Resource Hash
96910810e943ce4cb9e46b73aacfbc4abf11baf8b34045e6f6ad745e25785b95

Request headers

Host
benjaziamed.tn
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Date
Wed, 04 Mar 2020 21:59:10 GMT
Server
Apache
X-Powered-By
PHP/7.3.14
Content-Encoding
gzip
Vary
Accept-Encoding
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
aframe.min.js
aframe.io/releases/0.7.1/
1 MB
269 KB
Script
General
Full URL
https://aframe.io/releases/0.7.1/aframe.min.js
Requested by
Host: benjaziamed.tn
URL: https://benjaziamed.tn/support/exchange/index.php?m=brandy.hayes@cerner.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:df5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7ad5c207d145e67eea462732be66b7193e7f18d1b459373a39e2ed0a99380df1

Request headers

Referer
https://benjaziamed.tn/support/exchange/index.php?m=brandy.hayes@cerner.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 04 Mar 2020 21:59:10 GMT
content-encoding
br
cf-cache-status
HIT
age
30
status
200
last-modified
Wed, 05 Feb 2020 02:11:30 GMT
server
cloudflare
x-github-request-id
F6F6:0397:66071:8956E:5E3D2838
etag
W/"5e3a2452-10ea12"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
expires
Wed, 04 Mar 2020 21:37:13 GMT
cache-control
max-age=14400
cf-ray
56eedce4e872dfeb-FRA
x-proxy-cache
HIT
pit6cs7w7kpaau3erbtdku09.php
hostdmg.com.br/index/portal/ Frame 2634
Redirect Chain
  • https://hostdmg.com.br/index/portal
  • https://hostdmg.com.br/index/portal/
  • https://hostdmg.com.br/index/portal/pit6cs7w7kpaau3erbtdku09.php?GiJ64F15833591511850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f0752...
0
0
Document
General
Full URL
https://hostdmg.com.br/index/portal/pit6cs7w7kpaau3erbtdku09.php?GiJ64F15833591511850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc&email=&error=
Requested by
Host: benjaziamed.tn
URL: https://benjaziamed.tn/support/exchange/index.php?m=brandy.hayes@cerner.com
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.221.187.186 Orlando, United States, ASN33182 (DIMENOC, US),
Reverse DNS
server.dedicadomvf3.com
Software
nginx / PHP/7.2.28
Resource Hash

Request headers

:method
GET
:authority
hostdmg.com.br
:scheme
https
:path
/index/portal/pit6cs7w7kpaau3erbtdku09.php?GiJ64F15833591511850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc&email=&error=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://benjaziamed.tn/support/exchange/index.php?m=brandy.hayes@cerner.com
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://benjaziamed.tn/support/exchange/index.php?m=brandy.hayes@cerner.com

Response headers

status
200
server
nginx
date
Wed, 04 Mar 2020 21:59:11 GMT
content-type
text/html; charset=UTF-8
x-powered-by
PHP/7.2.28
content-encoding
gzip

Redirect headers

status
302
server
nginx
date
Wed, 04 Mar 2020 21:59:11 GMT
content-type
text/html; charset=UTF-8
content-length
0
location
pit6cs7w7kpaau3erbtdku09.php?GiJ64F15833591511850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc1850974a1ed7199f075272b7af6fd6cc&email=&error=
x-powered-by
PHP/7.2.28

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

16 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| logs object| THREE boolean| hasNativeWebVRImplementation object| WebVRConfig function| VRDisplay function| VRFrameData function| WebVRPolyfill object| TWEEN function| rStats function| glStats function| threeStats function| BrowserStats function| aframeStats object| AFRAME

0 Cookies

3 Console Messages

Source Level URL
Text
console-api log URL: https://aframe.io/releases/0.7.1/aframe.min.js(Line 388)
Message:
A-Frame Version: 0.7.1 (Date 18-10-2017, Commit #b9a751e)
console-api log URL: https://aframe.io/releases/0.7.1/aframe.min.js(Line 388)
Message:
three Version: ^0.87.0
console-api log URL: https://aframe.io/releases/0.7.1/aframe.min.js(Line 388)
Message:
WebVR Polyfill Version: ^0.9.36

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

aframe.io
benjaziamed.tn
hostdmg.com.br
107.189.162.104
162.221.187.186
2606:4700:20::681a:df5
7ad5c207d145e67eea462732be66b7193e7f18d1b459373a39e2ed0a99380df1
96910810e943ce4cb9e46b73aacfbc4abf11baf8b34045e6f6ad745e25785b95