lapis.gq
Open in
urlscan Pro
185.29.11.37
Malicious Activity!
Public Scan
Effective URL: http://lapis.gq/excel/5/oauth2/authorize/files/ec699345e56e9aed9b39542056a6.php?client_id=77Inboxaspxn825a90c9c2...
Submission: On November 23 via automatic, source openphish
Summary
This is the only time lapis.gq was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) Excel / PDF download (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 19 | 185.29.11.37 185.29.11.37 | 203557 (DATACLUB-) (DATACLUB-) | |
17 | 1 |
Domain | Requested by | |
---|---|---|
19 | lapis.gq |
2 redirects
lapis.gq
|
17 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://lapis.gq/excel/5/oauth2/authorize/files/ec699345e56e9aed9b39542056a6.php?client_id=77Inboxaspxn825a90c9c2d664a8527532d7d225&Id825a90c9c2d664a8527532d7d225&doc5478217ed1730bb57386ee548f41&login=&jiv5478217ed1730bb57386ee548f41&xls1d&id=fav&doc
Frame ID: E6C070B66389ADC8B9724DCD9E6599E2
Requests: 8 HTTP requests in this frame
Frame:
http://lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/login.php?login=&sfm_from_iframe=1
Frame ID: 4F07DE0835DD71F04FFE9EE6F78099E6
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://lapis.gq/excel/5/oauth2/authorize/files
HTTP 301
http://lapis.gq/excel/5/oauth2/authorize/files/ HTTP 302
http://lapis.gq/excel/5/oauth2/authorize/files/ec699345e56e9aed9b39542056a6.php?client_id=77... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Windows Server (Operating Systems) Expand
Detected patterns
- headers server /Win32|Win64/i
- html /<input[^>]+name="__VIEWSTATE/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
IIS (Web Servers) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://lapis.gq/excel/5/oauth2/authorize/files
HTTP 301
http://lapis.gq/excel/5/oauth2/authorize/files/ HTTP 302
http://lapis.gq/excel/5/oauth2/authorize/files/ec699345e56e9aed9b39542056a6.php?client_id=77Inboxaspxn825a90c9c2d664a8527532d7d225&Id825a90c9c2d664a8527532d7d225&doc5478217ed1730bb57386ee548f41&login=&jiv5478217ed1730bb57386ee548f41&xls1d&id=fav&doc Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
ec699345e56e9aed9b39542056a6.php
lapis.gq/excel/5/oauth2/authorize/files/ Redirect Chain
|
40 KB 40 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index_1.css
lapis.gq/excel/5/oauth2/authorize/files/ |
45 KB 45 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ewaother.png
lapis.gq/excel/5/oauth2/authorize/files/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ewacommon.png
lapis.gq/excel/5/oauth2/authorize/files/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ewaedit.png
lapis.gq/excel/5/oauth2/authorize/files/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.7.2.min.js
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ |
93 KB 93 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.sim.utils.js
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ |
13 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.jpg
lapis.gq/excel/5/oauth2/authorize/files/ |
48 KB 48 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.php
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.7.2.min.js
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
93 KB 93 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.sim.utils.js
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
13 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sfm-png-fix.js
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
excel.css
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
294.GIF
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
7 KB 7 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
excel-Submit-0.png
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
549 B 858 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
excel2013.png
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.gif
lapis.gq/excel/5/oauth2/authorize/files/trademanager/excel/ Frame 4F07 |
673 B 982 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) Excel / PDF download (Online)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| sfm_refresh_captcha function| sfm_hyper_link_popup function| sfm_popup_form function| sfm_window_popup_form function| sfmFormObj function| sfm_show_loading_on_formsubmit function| sfm_clear_form function| sfm_init_special_action_button function| sfm_init_default_text object| $ifr0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
lapis.gq
185.29.11.37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