medizag.com
Open in
urlscan Pro
31.22.4.235
Malicious Activity!
Public Scan
Effective URL: https://medizag.com/install/language/1/
Submission: On June 04 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on May 22nd 2020. Valid for: 3 months.
This is the only time medizag.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 198.54.125.159 198.54.125.159 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 52.239.153.36 52.239.153.36 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
4 | 31.22.4.235 31.22.4.235 | 34119 (WILDCARD-...) (WILDCARD-AS Wildcard UK Limited) | |
3 | 2a00:1450:400... 2a00:1450:4001:816::2004 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::2003 | 15169 (GOOGLE) (GOOGLE) | |
9 | 4 |
ASN22612 (NAMECHEAP-NET, US)
PTR: premium72-5.web-hosting.com
ymmc78.ymmcdew206.baadler.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
gnaklso9osj.blob.core.windows.net |
ASN34119 (WILDCARD-AS Wildcard UK Limited, GB)
PTR: sv26.byethost26.org
medizag.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
medizag.com
medizag.com |
66 KB |
3 |
google.com
www.google.com |
541 B |
1 |
gstatic.com
www.gstatic.com |
122 KB |
1 |
windows.net
gnaklso9osj.blob.core.windows.net |
935 B |
1 |
baadler.com
1 redirects
ymmc78.ymmcdew206.baadler.com |
284 B |
9 | 5 |
Domain | Requested by | |
---|---|---|
4 | medizag.com |
gnaklso9osj.blob.core.windows.net
medizag.com |
3 | www.google.com |
medizag.com
www.gstatic.com |
1 | www.gstatic.com |
www.google.com
|
1 | gnaklso9osj.blob.core.windows.net | |
1 | ymmc78.ymmcdew206.baadler.com | 1 redirects |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.blob.core.windows.net Microsoft IT TLS CA 4 |
2020-04-21 - 2022-04-21 |
2 years | crt.sh |
medizag.com Let's Encrypt Authority X3 |
2020-05-22 - 2020-08-20 |
3 months | crt.sh |
www.google.com GTS CA 1O1 |
2020-05-20 - 2020-08-12 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-05-20 - 2020-08-12 |
3 months | crt.sh |
This page contains 3 frames:
Primary Page:
https://medizag.com/install/language/1/
Frame ID: 0F20FA801E3D89F3601E0A90076ECE76
Requests: 7 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfrPbMUAAAAAF2DLXNWH8-s0Ln08lXtaX9k1tRC&co=aHR0cHM6Ly9tZWRpemFnLmNvbTo0NDM.&hl=en&type=image&v=ADnAC3ZykfbIOflWgrKNsVVT&theme=light&size=normal&badge=bottomright&cb=uzfi5dnvk4dd
Frame ID: 8AEF3518D2F161E3C65EBFB802C18BB0
Requests: 1 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/bframe?hl=en&v=ADnAC3ZykfbIOflWgrKNsVVT&k=6LfrPbMUAAAAAF2DLXNWH8-s0Ln08lXtaX9k1tRC&cb=4wpip37tuu6j
Frame ID: 7807DFB01BFB00CCD1D5954D0A980D8F
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://ymmc78.ymmcdew206.baadler.com/?R3drr=https%3A%2F%2Fgnaklso9osj.blob.core.windows.net%2Fnotsloskmnd8u%2Fcap...
HTTP 302
https://gnaklso9osj.blob.core.windows.net/notsloskmnd8u/capcha1.html Page URL
- https://medizag.com/install/language/1/ Page URL
Detected technologies
Microsoft HTTPAPI (Web Servers) ExpandDetected patterns
- headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i
reCAPTCHA (Captchas) Expand
Detected patterns
- script /\/recaptcha\/api\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ymmc78.ymmcdew206.baadler.com/?R3drr=https%3A%2F%2Fgnaklso9osj.blob.core.windows.net%2Fnotsloskmnd8u%2Fcapcha1.html%23mmizutani@ymmc.yamaha-motor.com
HTTP 302
https://gnaklso9osj.blob.core.windows.net/notsloskmnd8u/capcha1.html Page URL
- https://medizag.com/install/language/1/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://ymmc78.ymmcdew206.baadler.com/?R3drr=https%3A%2F%2Fgnaklso9osj.blob.core.windows.net%2Fnotsloskmnd8u%2Fcapcha1.html%23mmizutani@ymmc.yamaha-motor.com HTTP 302
- https://gnaklso9osj.blob.core.windows.net/notsloskmnd8u/capcha1.html
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
capcha1.html
gnaklso9osj.blob.core.windows.net/notsloskmnd8u/ Redirect Chain
|
532 B 935 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
medizag.com/install/language/1/ |
5 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
52B9DBC895D1896A.css
medizag.com/install/language/1/ASSETS-584796/_css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AEBB614B7D36A17D.js
medizag.com/install/language/1/ASSETS-584796/_js/ |
184 KB 56 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
www.google.com/recaptcha/ |
674 B 541 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l.png
medizag.com/install/language/1/ASSETS-584796/_img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
recaptcha__en.js
www.gstatic.com/recaptcha/releases/ADnAC3ZykfbIOflWgrKNsVVT/ |
309 KB 122 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
anchor
www.google.com/recaptcha/api2/ Frame 8AEF |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bframe
www.google.com/recaptcha/api2/ Frame 7807 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| _Z55B34752186CAC25 object| _S55B34752186CAC25 function| P55B34752186CAC25 function| E55B34752186CAC25 object| _config string| _translate function| t object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| recaptcha object| closure_lm_5446061 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
medizag.com/ | Name: toxic_hydra Value: 7613f3a18cb98abbd916b5130de895bc4ea7f81b |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
gnaklso9osj.blob.core.windows.net
medizag.com
www.google.com
www.gstatic.com
ymmc78.ymmcdew206.baadler.com
198.54.125.159
2a00:1450:4001:816::2004
2a00:1450:4001:820::2003
31.22.4.235
52.239.153.36
022c58ff86ea5e8879143642860a6fb361dce3cfd0734f08dde8b293fb6a203f
42187e8f846f2e1c3c0ce8142a63693f295625404d3f6eb27291b7a3f22b9449
6b045fc533c6aaf0590a2acdf82263388bbf2b1f7695c944b167ff6bd79bc404
7c9839b2397b0b3c559f553cda2cfa7fa1b437c6c6d1dd8b19f040d0360d19c5
929b173fe5de52e86be43b47db00cf8fce66664a2f3c69b5710664de66ab0ba0
983b1f9b2dcc92ca50844521104c72bac1de8d66aa39bf5bd16946ee1b2cbf48
b7716d1d5b9e2170322c5fa6fea3f4ad32105f17528860652ea08756cd569e56