mushaf.qurancomplex.gov.sa
Open in
urlscan Pro
198.57.166.170
Malicious Activity!
Public Scan
Submission: On December 04 via automatic, source openphish
Summary
This is the only time mushaf.qurancomplex.gov.sa was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 198.57.166.170 198.57.166.170 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
2 | 141.8.224.93 141.8.224.93 | 40034 (CONFLUENC...) (CONFLUENCE-NETWORK-INC - Confluence Networks Inc) | |
1 | 2a00:1450:400... 2a00:1450:4001:817::200e | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 2 | 172.82.228.16 172.82.228.16 | 15224 (OMNITURE) (OMNITURE - Adobe Systems Inc.) | |
7 | 5 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: 198-57-166-170.unifiedlayer.com
mushaf.qurancomplex.gov.sa |
ASN40034 (CONFLUENCE-NETWORK-INC - Confluence Networks Inc, VG)
easycliq.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
qurancomplex.gov.sa
mushaf.qurancomplex.gov.sa |
262 KB |
2 |
adobe.com
1 redirects
stats.adobe.com |
1 KB |
2 |
easycliq.net
easycliq.net |
928 B |
1 |
gstatic.com
encrypted-tbn2.gstatic.com |
8 KB |
7 | 4 |
Domain | Requested by | |
---|---|---|
3 | mushaf.qurancomplex.gov.sa |
mushaf.qurancomplex.gov.sa
|
2 | stats.adobe.com |
1 redirects
mushaf.qurancomplex.gov.sa
|
2 | easycliq.net |
mushaf.qurancomplex.gov.sa
|
1 | encrypted-tbn2.gstatic.com |
mushaf.qurancomplex.gov.sa
|
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.google.com Google Internet Authority G2 |
2017-11-16 - 2018-02-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://mushaf.qurancomplex.gov.sa/oman/php/doc.html
Frame ID: 14599.1
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- http://stats.adobe.com/b/ss/adbimsqa,adbadobenonacdcqa/1/JS-1.2.3/s58273969380259?AQB=1&ndh=1&t=4%2F11%2F2017%2010%3A44%3A37%201%200&ce=UTF-8&ns=adobecorp&pageName=Account%3AOnLoad_ims_SignInForm&g=http%3A%2F%2Fmushaf.qurancomplex.gov.sa%2Foman%2Fphp%2Fdoc.html&ch=IMS&c3=services.adobe.com&c4=en_US&c5=en_US%3AAccount%3AOnLoad_ims_SignInForm&v13=SignInForm&v30=adobedotcom_TOU_client2&s=1600x1200&c=24&j=1.6&v=N&k=N&bw=1600&bh=1200&AQE=1 HTTP 302
- http://stats.adobe.com/b/ss/adbimsqa,adbadobenonacdcqa/1/JS-1.2.3/s58273969380259?AQB=1&pccr=true&vidn=2D12938A85314071-40000118C00063F2&&ndh=1&t=4%2F11%2F2017%2010%3A44%3A37%201%200&ce=UTF-8&ns=adobecorp&pageName=Account%3AOnLoad_ims_SignInForm&g=http%3A%2F%2Fmushaf.qurancomplex.gov.sa%2Foman%2Fphp%2Fdoc.html&ch=IMS&c3=services.adobe.com&c4=en_US&c5=en_US%3AAccount%3AOnLoad_ims_SignInForm&v13=SignInForm&v30=adobedotcom_TOU_client2&s=1600x1200&c=24&j=1.6&v=N&k=N&bw=1600&bh=1200&AQE=1
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
doc.html
mushaf.qurancomplex.gov.sa/oman/php/ |
262 KB 262 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ath5djs.js
mushaf.qurancomplex.gov.sa/oman/php/Sign%20in%20-%20Adobe%20Files_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
d_002.htm
easycliq.net/Sign%20in%20-%20Adobe%20File_files/ |
995 B 464 B |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
d.htm
easycliq.net/Sign%20in%20-%20Adobe%20File_files/ |
995 B 464 B |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
images
encrypted-tbn2.gstatic.com/ |
8 KB 8 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
s58273969380259
stats.adobe.com/b/ss/adbimsqa,adbadobenonacdcqa/1/JS-1.2.3/ Redirect Chain
|
43 B 43 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
squarespinner_2x.gif
mushaf.qurancomplex.gov.sa/renga-idprovider/resources/web_v2/img/ |
544 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer)33 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| special_day_char function| css_browser_selector function| Visitor function| AppMeasurement function| s_gi function| s_pgicq number| CSSBS number| CSSBS_webkit number| CSSBS_chrome number| CSSBS_mac number| CSSBS_js number| CSSBS_portrait number| s_objectID number| s_giq undefined| s_code string| s_account string| scJsHost function| scReport object| s_c_il number| s_c_in object| s object| s_i_adbimsqa_adbadobenonacdcqa number| ob function| FastClick function| getValidatorGroups function| getEnhancedDropdownParent object| components function| _now function| debounce function| $ function| jQuery object| jQuery19103599624517450679 object| IMS0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
easycliq.net
encrypted-tbn2.gstatic.com
mushaf.qurancomplex.gov.sa
stats.adobe.com
141.8.224.93
172.82.228.16
198.57.166.170
2a00:1450:4001:817::200e
096ffa283a1a1ca9ac8f1f72def8edd7df59aa3d75918b43a277089ada6773c6
0f7ca77a8ac88efd0254763ffd1e11bb301f729c71988b7abb7f2e32d58126dc
530bce61af88eb164d6b6dacdc2c66338434b25787ab2479f1fa135a4e569152
6c4f9a6d5a09aa3073c2f9b41f2d229d26c67bec892c53e9d61377343546c80b
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
d6300af2babed60e1b2411e50124ba20fc8cd688b360a5f1498cacd204e90770