universal-exim.com
Open in
urlscan Pro
103.83.81.80
Malicious Activity!
Public Scan
Submission: On April 15 via api from CA
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on April 11th 2020. Valid for: 3 months.
This is the only time universal-exim.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 103.83.81.80 103.83.81.80 | 138251 (ZINIOSS-A...) (ZINIOSS-AS-IN Zinios Information Technology Pvt Ltd) | |
10 | 151.101.114.133 151.101.114.133 | 54113 (FASTLY) (FASTLY) | |
11 | 2 |
ASN138251 (ZINIOSS-AS-IN Zinios Information Technology Pvt Ltd, IN)
PTR: server.dooblecoin.org
universal-exim.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
paypalobjects.com
www.paypalobjects.com |
284 KB |
1 |
universal-exim.com
universal-exim.com |
4 KB |
11 | 2 |
Domain | Requested by | |
---|---|---|
10 | www.paypalobjects.com |
universal-exim.com
|
1 | universal-exim.com | |
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
universal-exim.com Let's Encrypt Authority X3 |
2020-04-11 - 2020-07-10 |
3 months | crt.sh |
www.paypalobjects.com DigiCert SHA2 Extended Validation Server CA |
2019-12-09 - 2021-12-13 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://universal-exim.com/js/pay.update/
Frame ID: 5217F356EA43D24FB0E7CD04D80B169C
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
universal-exim.com/js/pay.update/ |
23 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-min.css
www.paypalobjects.com/digitalassets/c/website/marketing/global/ss7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-theme-min.css
www.paypalobjects.com/digitalassets/c/website/marketing/global/ss7/css/ |
23 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
77b924a83312878dd46ac7dff08d0eecb52c7b.css
www.paypalobjects.com/eboxapps/css/2c/ |
161 B 560 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b6a170848d6e52520ff377847df91ba670da58.css
www.paypalobjects.com/eboxapps/css/57/ |
225 KB 35 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oneTouchInject.min.js
www.paypalobjects.com/web/res/e59/ec6c2b16fc0a5365f00c2a3798b1c/ |
3 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ppcom.svg
www.paypalobjects.com/webstatic/i/logo/rebrand/ |
5 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Light.woff2
www.paypalobjects.com/ui-web/paypal-sans-big/1-0-0/ |
37 KB 38 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansSmall-Regular.woff2
www.paypalobjects.com/ui-web/paypal-sans-small/1-0-0/ |
36 KB 37 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite_countries_flag4.png
www.paypalobjects.com/webstatic/mktg/icons/ |
108 KB 108 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansSmall-Medium.woff2
www.paypalobjects.com/ui-web/paypal-sans-small/1-0-0/ |
38 KB 38 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| email object| pass object| email_error object| pass_error function| Validate object| PAYPAL0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
universal-exim.com
www.paypalobjects.com
103.83.81.80
151.101.114.133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