auswidegroup.net Open in urlscan Pro
203.114.76.76  Malicious Activity! Public Scan

Submitted URL: https://wishbrick.com/-8e-0dal-0dps-e8jeragm-9a-8e-0dm
Effective URL: https://auswidegroup.net/user/aspx1.php
Submission: On September 14 via manual from GB — Scanned from DE

Summary

This website contacted 2 IPs in 2 countries across 4 domains to perform 4 HTTP transactions. The main IP is 203.114.76.76, located in Adelaide CBD, Australia and belongs to OVERTHEWIRE-AS-AP Over The Wire Pty Ltd, AU. The main domain is auswidegroup.net.
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 15th 2021. Valid for: 3 months.
This is the only time auswidegroup.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 103.92.235.130 135822 (HOSRAJA-A...)
1 3 203.114.76.76 9268 (OVERTHEWI...)
4 2
Apex Domain
Subdomains
Transfer
3 auswidegroup.net
auswidegroup.net
20 KB
1 wishbrick.com
wishbrick.com
312 B
0 jeragm.com Failed
www.jeragm.com Failed
0 clearbit.com Failed
logo.clearbit.com Failed
4 4
Domain Requested by
3 auswidegroup.net 1 redirects auswidegroup.net
1 wishbrick.com 1 redirects
0 www.jeragm.com Failed auswidegroup.net
0 logo.clearbit.com Failed auswidegroup.net
4 4

This site contains no links.

Subject Issuer Validity Valid
www.auswidegroup.net
cPanel, Inc. Certification Authority
2021-07-15 -
2021-10-13
3 months crt.sh

This page contains 2 frames:

Primary Page: https://auswidegroup.net/user/aspx1.php
Frame ID: 6F2712D86BBB833103370E3AEB310D57
Requests: 7 HTTP requests in this frame

Frame: https://www.jeragm.com/
Frame ID: 3B1A84AD9335C27B7826D4789755B0F9
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Sign in to Jeragm Security and Quarantine Center

Page URL History Show full URLs

  1. https://wishbrick.com/-8e-0dal-0dps-e8jeragm-9a-8e-0dm HTTP 302
    https://auswidegroup.net/user/?client-request-id=Y29hbG9wc0BqZXJhZ20uY29t HTTP 302
    https://auswidegroup.net/user/aspx1.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.aspx?(?:$|\?)

Page Statistics

4
Requests

50 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

2
IPs

2
Countries

19 kB
Transfer

60 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://wishbrick.com/-8e-0dal-0dps-e8jeragm-9a-8e-0dm HTTP 302
    https://auswidegroup.net/user/?client-request-id=Y29hbG9wc0BqZXJhZ20uY29t HTTP 302
    https://auswidegroup.net/user/aspx1.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request aspx1.php
auswidegroup.net/user/
Redirect Chain
  • https://wishbrick.com/-8e-0dal-0dps-e8jeragm-9a-8e-0dm
  • https://auswidegroup.net/user/?client-request-id=Y29hbG9wc0BqZXJhZ20uY29t
  • https://auswidegroup.net/user/aspx1.php
51 KB
19 KB
Document
General
Full URL
https://auswidegroup.net/user/aspx1.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
203.114.76.76 Adelaide CBD, Australia, ASN9268 (OVERTHEWIRE-AS-AP Over The Wire Pty Ltd, AU),
Reverse DNS
plutoweb.auswideservices.net
Software
LiteSpeed /
Resource Hash
d9d489dd4b25495b528f424a1fae0ed2885b841e3bc2dfa6a409937e9d8ae0a6

Request headers

:method
GET
:authority
auswidegroup.net
:scheme
https
:path
/user/aspx1.php
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
accept-language
de-DE,de;q=0.9
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
cookie
PHPSESSID=3b8586242b6755e6d5f63655881a96d4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
content-type
text/html; charset=UTF-8
content-encoding
br
vary
Accept-Encoding
date
Tue, 14 Sep 2021 08:59:51 GMT
server
LiteSpeed
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-Q039=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-22=":443"; ma=2592000

Redirect headers

set-cookie
PHPSESSID=3b8586242b6755e6d5f63655881a96d4; path=/
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-cache, no-store, must-revalidate, max-age=0
pragma
no-cache
location
aspx1.php
content-type
text/html; charset=UTF-8
content-length
0
date
Tue, 14 Sep 2021 08:59:50 GMT
server
LiteSpeed
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-Q039=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-22=":443"; ma=2592000
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Content-Type
image/png
jeragm.com
logo.clearbit.com/
0
0

/
www.jeragm.com/ Frame 3B1A
0
0

truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Content-Type
image/png
segoeui-regular.ttf
auswidegroup.net/owa/auth/15.1.2242/themes/resources/
0
0
Font
General
Full URL
https://auswidegroup.net/owa/auth/15.1.2242/themes/resources/segoeui-regular.ttf
Requested by
Host: auswidegroup.net
URL: https://auswidegroup.net/user/aspx1.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
203.114.76.76 Adelaide CBD, Australia, ASN9268 (OVERTHEWIRE-AS-AP Over The Wire Pty Ltd, AU),
Reverse DNS
plutoweb.auswideservices.net
Software
LiteSpeed /
Resource Hash

Request headers

sec-fetch-mode
cors
origin
https://auswidegroup.net
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
sec-fetch-dest
font
cookie
PHPSESSID=3b8586242b6755e6d5f63655881a96d4
:path
/owa/auth/15.1.2242/themes/resources/segoeui-regular.ttf
pragma
no-cache
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
auswidegroup.net
referer
https://auswidegroup.net/user/aspx1.php
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://auswidegroup.net/user/aspx1.php
Origin
https://auswidegroup.net
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Tue, 14 Sep 2021 08:59:52 GMT
content-encoding
br
server
LiteSpeed
link
<https://auswidegroup.net/wp-json/>; rel="https://api.w.org/"
x-litespeed-cache
hit
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-Q039=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-22=":443"; ma=2592000
content-length
3882
expires
Wed, 11 Jan 1984 05:00:00 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
logo.clearbit.com
URL
https://logo.clearbit.com/jeragm.com
Domain
www.jeragm.com
URL
https://www.jeragm.com/

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

33 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| onbeforexrselect boolean| originAgentCluster function| initLogon function| redir function| shw function| hd function| clkSecExp function| kdSecExp function| clkSec function| clkBsc function| checkSubmit function| clkLgn function| clkRtry function| clkReLgn function| gbid function| IsOwaPremiumBrowser function| hres function| LogoffMime function| addPerfMarker number| a_fRC number| g_fFcs number| a_fLOff number| a_fCAC number| a_fEnbSMm function| IsMimeCtlInst function| RndMimeCtl object| mainLogonDiv boolean| showPlaceholderText string| mainLogonDivClassName function| setPlaceholderText function| showPasswordClick object| input

1 Cookies

Domain/Path Name / Value
auswidegroup.net/ Name: PHPSESSID
Value: 3b8586242b6755e6d5f63655881a96d4

1 Console Messages

Source Level URL
Text
network error URL: https://auswidegroup.net/owa/auth/15.1.2242/themes/resources/segoeui-regular.ttf
Message:
Failed to load resource: the server responded with a status of 404 ()