obogrev.com.ru
Open in
urlscan Pro
78.110.50.110
Malicious Activity!
Public Scan
Effective URL: http://obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/amex-login.php?cmd=www.ssaonline-account-service.com/lo...
Submission: On December 31 via manual from US
Summary
This is the only time obogrev.com.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: American Express (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 45.40.140.1 45.40.140.1 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
3 6 | 78.110.50.110 78.110.50.110 | 31240 (HT-SYSTEM...) (HT-SYSTEMS-AS Uplinks:) | |
3 | 2 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-45-40-140-1.ip.secureserver.net
x.co |
ASN31240 (HT-SYSTEMS-AS Uplinks:, RU)
PTR: cl19-w.ht-systems.ru
obogrev.com.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
com.ru
3 redirects
obogrev.com.ru |
510 KB |
2 |
x.co
2 redirects
x.co |
290 B |
3 | 2 |
Domain | Requested by | |
---|---|---|
6 | obogrev.com.ru |
3 redirects
obogrev.com.ru
|
2 | x.co | 2 redirects |
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/amex-login.php?cmd=www.ssaonline-account-service.com/login/account/update_submit&id=11de01734dd27b89caed6d01c5a111f011de01734dd27b89caed6d01c5a111f0&session=11de01734dd27b89caed6d01c5a111f011de01734dd27b89caed6d01c5a111f0
Frame ID: B434AE3A9551686439EE90700CB98A53
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://x.co/amemon001
HTTP 301
https://x.co/amemon001 HTTP 302
http://obogrev.com.ru/dir/amx/ HTTP 302
http://obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac?cmd=login=https://www.americanexpre... HTTP 301
http://obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/?cmd=login=https://www.americanexpr... HTTP 302
http://obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/amex-login.php?cmd=www.ssaonline-ac... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Red Hat (Operating Systems) Expand
Detected patterns
- headers server /Red Hat/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://x.co/amemon001
HTTP 301
https://x.co/amemon001 HTTP 302
http://obogrev.com.ru/dir/amx/ HTTP 302
http://obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac?cmd=login=https://www.americanexpress.com/account/service/american-technical-department HTTP 301
http://obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/?cmd=login=https://www.americanexpress.com/account/service/american-technical-department HTTP 302
http://obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/amex-login.php?cmd=www.ssaonline-account-service.com/login/account/update_submit&id=11de01734dd27b89caed6d01c5a111f011de01734dd27b89caed6d01c5a111f0&session=11de01734dd27b89caed6d01c5a111f011de01734dd27b89caed6d01c5a111f0 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
amex-login.php
obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/ Redirect Chain
|
507 KB 508 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style1.css
obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/css/ |
0 269 B |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign-on.png
obogrev.com.ru/dir/amx/fa5e773b392c9fe91537a4d7e3f341ac/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
379 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: American Express (Financial)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
obogrev.com.ru
x.co
45.40.140.1
78.110.50.110
2fe53ae0a0ca35efbd75d1021fc3ebae965ea5ab3828520dcb2a75d3a967b409
a4d17efd7eb41e008a0c68c8218e9f51859406721d45a6bf4d71fb63afd99f34
ab0cac65e31ce8bcd4ab4c81c85d8450ee991c722ce1eb4a629c4af6e8905f39
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855