medizag.com
Open in
urlscan Pro
31.22.4.235
Malicious Activity!
Public Scan
Effective URL: https://medizag.com/install/language/1/
Submission: On June 05 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on May 22nd 2020. Valid for: 3 months.
This is the only time medizag.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 198.54.125.159 198.54.125.159 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 52.239.155.196 52.239.155.196 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
4 | 31.22.4.235 31.22.4.235 | 34119 (WILDCARD-...) (WILDCARD-AS Wildcard UK Limited) | |
3 | 2a00:1450:400... 2a00:1450:4001:81f::2004 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:81e::2003 | 15169 (GOOGLE) (GOOGLE) | |
9 | 4 |
ASN22612 (NAMECHEAP-NET, US)
PTR: premium72-5.web-hosting.com
yum78.yumdew206.baadler.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
nsis00eio.blob.core.windows.net |
ASN34119 (WILDCARD-AS Wildcard UK Limited, GB)
PTR: sv26.byethost26.org
medizag.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
medizag.com
medizag.com |
66 KB |
3 |
google.com
www.google.com |
531 B |
1 |
gstatic.com
www.gstatic.com |
122 KB |
1 |
windows.net
nsis00eio.blob.core.windows.net |
935 B |
1 |
baadler.com
1 redirects
yum78.yumdew206.baadler.com |
272 B |
9 | 5 |
Domain | Requested by | |
---|---|---|
4 | medizag.com |
nsis00eio.blob.core.windows.net
medizag.com |
3 | www.google.com |
medizag.com
www.gstatic.com |
1 | www.gstatic.com |
www.google.com
|
1 | nsis00eio.blob.core.windows.net | |
1 | yum78.yumdew206.baadler.com | 1 redirects |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.blob.core.windows.net Microsoft IT TLS CA 1 |
2020-05-10 - 2022-05-10 |
2 years | crt.sh |
medizag.com Let's Encrypt Authority X3 |
2020-05-22 - 2020-08-20 |
3 months | crt.sh |
www.google.com GTS CA 1O1 |
2020-05-05 - 2020-07-28 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-05-20 - 2020-08-12 |
3 months | crt.sh |
This page contains 3 frames:
Primary Page:
https://medizag.com/install/language/1/
Frame ID: D33C674687C614F97BD1DCEC945D6FD1
Requests: 7 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfrPbMUAAAAAF2DLXNWH8-s0Ln08lXtaX9k1tRC&co=aHR0cHM6Ly9tZWRpemFnLmNvbTo0NDM.&hl=en&type=image&v=ADnAC3ZykfbIOflWgrKNsVVT&theme=light&size=normal&badge=bottomright&cb=i4ielhtpx8ey
Frame ID: 5A8047BC7995EF24AF785DFF8FB44F9E
Requests: 1 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/bframe?hl=en&v=ADnAC3ZykfbIOflWgrKNsVVT&k=6LfrPbMUAAAAAF2DLXNWH8-s0Ln08lXtaX9k1tRC&cb=nyocor5yrb03
Frame ID: 1B57B9746B3CCCCC83E06C3B1E72F14F
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://yum78.yumdew206.baadler.com/?R3drr=https%3A%2F%2Fnsis00eio.blob.core.windows.net%2Fdnndocjd994j%2Fcapcha...
HTTP 302
https://nsis00eio.blob.core.windows.net/dnndocjd994j/capcha1.html Page URL
- https://medizag.com/install/language/1/ Page URL
Detected technologies
Microsoft HTTPAPI (Web Servers) ExpandDetected patterns
- headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i
reCAPTCHA (Captchas) Expand
Detected patterns
- script /\/recaptcha\/api\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://yum78.yumdew206.baadler.com/?R3drr=https%3A%2F%2Fnsis00eio.blob.core.windows.net%2Fdnndocjd994j%2Fcapcha1.html%23sharon.winstel@yum.com
HTTP 302
https://nsis00eio.blob.core.windows.net/dnndocjd994j/capcha1.html Page URL
- https://medizag.com/install/language/1/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://yum78.yumdew206.baadler.com/?R3drr=https%3A%2F%2Fnsis00eio.blob.core.windows.net%2Fdnndocjd994j%2Fcapcha1.html%23sharon.winstel@yum.com HTTP 302
- https://nsis00eio.blob.core.windows.net/dnndocjd994j/capcha1.html
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
capcha1.html
nsis00eio.blob.core.windows.net/dnndocjd994j/ Redirect Chain
|
532 B 935 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
medizag.com/install/language/1/ |
5 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
95B031D91F121124.css
medizag.com/install/language/1/ASSETS-584796/_css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
332D445333362A6C.js
medizag.com/install/language/1/ASSETS-584796/_js/ |
184 KB 56 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
www.google.com/recaptcha/ |
674 B 531 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l.png
medizag.com/install/language/1/ASSETS-584796/_img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
recaptcha__en.js
www.gstatic.com/recaptcha/releases/ADnAC3ZykfbIOflWgrKNsVVT/ |
309 KB 122 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
anchor
www.google.com/recaptcha/api2/ Frame 5A80 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bframe
www.google.com/recaptcha/api2/ Frame 1B57 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| _ZA30411B9A0DF10B3 object| _SA30411B9A0DF10B3 function| PA30411B9A0DF10B3 function| EA30411B9A0DF10B3 object| _config string| _translate function| t object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| recaptcha object| closure_lm_5535911 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
medizag.com/ | Name: toxic_hydra Value: 8858d8b28a0f32899693f24203d6d07cb554b666 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
medizag.com
nsis00eio.blob.core.windows.net
www.google.com
www.gstatic.com
yum78.yumdew206.baadler.com
198.54.125.159
2a00:1450:4001:81e::2003
2a00:1450:4001:81f::2004
31.22.4.235
52.239.155.196
022c58ff86ea5e8879143642860a6fb361dce3cfd0734f08dde8b293fb6a203f
42187e8f846f2e1c3c0ce8142a63693f295625404d3f6eb27291b7a3f22b9449
6b045fc533c6aaf0590a2acdf82263388bbf2b1f7695c944b167ff6bd79bc404
929b173fe5de52e86be43b47db00cf8fce66664a2f3c69b5710664de66ab0ba0
983b1f9b2dcc92ca50844521104c72bac1de8d66aa39bf5bd16946ee1b2cbf48
a5e78f3361fab4d8336e33069695e5460e115c8312037537ed01c13c80824d76
c14d727760e465f59a2473ccb28b84615a0ff6cb19ec04dcd51eae41b5621fb7