hkjashdkadlasd.top
Open in
urlscan Pro
156.251.134.98
Public Scan
Submission Tags: @ecarlesi threat #malware Search All
Submission: On September 05 via api from FR — Scanned from FR
Summary
TLS certificate: Issued by R3 on September 4th 2023. Valid for: 3 months.
This is the only time hkjashdkadlasd.top was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 156.251.134.98 156.251.134.98 | 40065 (CNSERVERS) (CNSERVERS) | |
1 | 139.200.106.73 139.200.106.73 | 4134 (CHINANET-...) (CHINANET-BACKBONE No.31) | |
2 | 170.33.96.105 170.33.96.105 | 134963 (ASEPL-AS-...) (ASEPL-AS-AP Alibaba.com Singapore E-Commerce Private Limited) | |
19 | 4 |
ASN134963 (ASEPL-AS-AP Alibaba.com Singapore E-Commerce Private Limited, SG)
sdk.renrenjihua.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
hkjashdkadlasd.top
hkjashdkadlasd.top |
841 KB |
2 |
renrenjihua.com
sdk.renrenjihua.com — Cisco Umbrella Rank: 850611 |
1012 B |
1 |
bootcdn.net
cdn.bootcdn.net — Cisco Umbrella Rank: 108560 |
35 KB |
0 |
fcapp.run
Failed
xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run Failed |
|
19 | 4 |
Domain | Requested by | |
---|---|---|
15 | hkjashdkadlasd.top |
hkjashdkadlasd.top
|
2 | sdk.renrenjihua.com |
hkjashdkadlasd.top
|
1 | cdn.bootcdn.net |
hkjashdkadlasd.top
|
0 | xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run Failed |
hkjashdkadlasd.top
|
19 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
hkjashdkadlasd.top R3 |
2023-09-04 - 2023-12-03 |
3 months | crt.sh |
*.bootcdn.net Sectigo RSA Domain Validation Secure Server CA |
2023-08-17 - 2024-08-17 |
a year | crt.sh |
*.renrenjihua.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-31 - 2024-07-30 |
a year | crt.sh |
This page contains 1 frames:
Frame:
https://xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run/huaxin-p8YYu-vf125111f.apk?t=1693878231013
Frame ID: BF4F578056754F5DE66B312AC4D15409
Requests: 19 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 17- https://app-oc53tl.renrenjihua.com/page/oc53tl/install/c/eyJtIjoiVEhmX0d2ZDVueDBBQUFHS1l3S2JHX3hwMlFIRGpyR1d1MnZ4QlMtRTdHOWFVZUlhZ3JoS2NmYXFPY2RDejg4In0=?p=0 HTTP 302
- https://ztdmoevc.oss-accelerate.aliyuncs.com/p8YYu.html HTTP 302
- https://xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run/huaxin-p8YYu-vf125111f.apk?t=1693878231013
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
hkjashdkadlasd.top/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
reset.css
hkjashdkadlasd.top/css/ |
1 KB 784 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
hkjashdkadlasd.top/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdn.bootcdn.net/ajax/libs/jquery/3.5.1/ |
87 KB 35 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg1.jpg
hkjashdkadlasd.top/images/ |
79 KB 79 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg2.jpg
hkjashdkadlasd.top/images/ |
259 KB 260 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg3.jpg
hkjashdkadlasd.top/images/ |
331 KB 331 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
hkjashdkadlasd.top/images/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kefu.png
hkjashdkadlasd.top/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
title3.png
hkjashdkadlasd.top/images/ |
130 KB 130 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aixin.png
hkjashdkadlasd.top/images/ |
479 B 688 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
android.png
hkjashdkadlasd.top/images/ |
486 B 695 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ios.png
hkjashdkadlasd.top/images/ |
482 B 691 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer.png
hkjashdkadlasd.top/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
appinstall.js
hkjashdkadlasd.top/ |
46 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aixin.png
hkjashdkadlasd.top/images/ |
479 B 688 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
init
sdk.renrenjihua.com/web/oc53tl/_/ |
523 B 741 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
eyJtIjoiOVZ4aXBDb2ROdEFBQUFHS1l3S2JHNHEwUHhNaEVuRWU3aEk5emNaUFpLaUNwNEJJZ3VIYTlVMUVLUU55X0hVIn0=
sdk.renrenjihua.com/web/oc53tl/_/clicked/c/ |
0 271 B |
Ping
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
huaxin-p8YYu-vf125111f.apk
xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run
- URL
- https://xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run/huaxin-p8YYu-vf125111f.apk?t=1693878231013
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.bootcdn.net
hkjashdkadlasd.top
sdk.renrenjihua.com
xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run
xgbrcrej-uvswkjmi-txqchffsfb.cn-shenzhen.fcapp.run
139.200.106.73
156.251.134.98
170.33.96.105
1ec4722332f294f4697f3b3859214a2a20900dbc2739cff39a3bf68aded7ce32
41ebd2d88a2c35d6fb78602766400a8dfa7227552bb13b04da004365148b201a
53711a672c648472e8dc69189cc058def5f78773ced3604606b2222d252521fd
56848cec2f732d983bcb2680d29aeb8ec172181a148dbec26bfe0e82c688fc17
63bbd64ac12203404984348ca6a377f53cd448bc42a879036ab0c5c6fcfae846
63fe5af4f365227f7246ccdb225be1d6190b6da10a688f8ad5a5c6fa7651637c
7642e87b8017e4bbd8d27212d5b7de4ca14f81d5b1470f41296c36dea74b8fb2
7eded748802e6e1df8650b77098c327ce4cd8fd3fcb2e1ed886ad219669c7c2d
8a28e0f121fe92d9879f732bb36ef19e4328b1855802f59714a87d75a1a5f8fe
992c9ad08689ec6123a4b1ffc50423e6ebbf9c14b1cc43c70875a7839dc7e0c4
a39e0ee4fb62878fb7054b94dbfe2397aa67e1c9cb00c9fb1fbe0170839c6372
c480e4efcce2926e0f66e20ba04af8c09cfde48f28287689958430afcc21900e
d3edd8f0b1d578b29862811d55db25a225096ad191e88573e8868cc5931ba0f4
f06e7d26ae9a23e8b87641b052b7dffe977af642619c827a33c04ab869397a59
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d