cust0merhelp-supp0rt.ju5t-1nf0.org
Open in
urlscan Pro
3.24.61.62
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On April 23 via api from US
Summary
This is the only time cust0merhelp-supp0rt.ju5t-1nf0.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 3.24.61.62 3.24.61.62 | 16509 (AMAZON-02) (AMAZON-02) | |
2 9 | 151.101.114.133 151.101.114.133 | 54113 (FASTLY) (FASTLY) | |
1 | 151.101.1.35 151.101.1.35 | 54113 (FASTLY) (FASTLY) | |
9 | 3 |
ASN16509 (AMAZON-02, US)
PTR: awcp035.server-cpanel.com
cust0merhelp-supp0rt.ju5t-1nf0.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
paypalobjects.com
2 redirects
www.paypalobjects.com |
149 KB |
1 |
paypal.com
t.paypal.com |
678 B |
1 |
ju5t-1nf0.org
cust0merhelp-supp0rt.ju5t-1nf0.org |
10 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
9 | www.paypalobjects.com |
2 redirects
cust0merhelp-supp0rt.ju5t-1nf0.org
www.paypalobjects.com |
1 | t.paypal.com | |
1 | cust0merhelp-supp0rt.ju5t-1nf0.org | |
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypalobjects.com DigiCert SHA2 Extended Validation Server CA |
2019-12-09 - 2021-12-13 |
2 years | crt.sh |
t.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-11-17 - 2021-11-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://cust0merhelp-supp0rt.ju5t-1nf0.org/webapps/b832e/websrc?cmd=_login-submit&dispatch=b3adee67cd24553cbf9ed79ed77632a495e1738442f4a49443ce94d0e0409a03ffa9f7ed
Frame ID: 809039EF738C3C098D520E25AFE95167
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
PayPal (Payment Processors) Expand
Detected patterns
- script /paypalobjects\.com\/js/i
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- script /require.*\.js/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://www.paypalobjects.com/js/site_catalyst/pp_jscode_080706.js HTTP 301
- https://www.paypalobjects.com/js/site_catalyst/pp_jscode_080706.js
- http://www.paypalobjects.com/pa/js/pa.js HTTP 301
- https://www.paypalobjects.com/pa/js/pa.js
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
websrc
cust0merhelp-supp0rt.ju5t-1nf0.org/webapps/b832e/ |
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.css
www.paypalobjects.com/web/res/882/f03ec0b55ee153b469c844decd2ff/css/ |
31 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr-2.6.1.js
www.paypalobjects.com/web/res/882/f03ec0b55ee153b469c844decd2ff/js/lib/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
require.js
www.paypalobjects.com/web/res/882/f03ec0b55ee153b469c844decd2ff/js/lib/ |
15 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
www.paypalobjects.com/web/res/882/f03ec0b55ee153b469c844decd2ff/js/ |
284 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pp_jscode_080706.js
www.paypalobjects.com/js/site_catalyst/ Redirect Chain
|
60 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pa.js
www.paypalobjects.com/pa/js/ Redirect Chain
|
52 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ts
t.paypal.com/ |
42 B 678 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)48 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| html5 object| Modernizr object| antiClickjack function| require function| requirejs function| define function| getGlobal object| dust function| extend function| $ function| jQuery function| _ object| Backbone object| PAYPAL object| jQuery18004278035655006571 boolean| webkit string| sc_code_ver string| s_account object| s function| s_doPlugins string| s_code string| s_objectID function| s_gi function| s_giqf string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in number| s_giq function| scOnload object| fpti string| fptiserverurl object| _ifpti string| j object| s_i_paypal2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.ju5t-1nf0.org/ | Name: s_sess Value: %20s_ppv%3D100%3B%20s_cc%3Dtrue%3B%20v31%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%3B%20s_sq%3D%3B |
|
.ju5t-1nf0.org/ | Name: s_pers Value: %20s_fid%3D3FEDEF964EF3D89F-182ED7D98966003E%7C1682212810398%3B%20gpv_c43%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%7C1619142610402%3B%20tr_p1%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%7C1619142610404%3B%20gpv_events%3Dno%2520value%7C1619142610405%3B |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cust0merhelp-supp0rt.ju5t-1nf0.org
t.paypal.com
www.paypalobjects.com
151.101.1.35
151.101.114.133
3.24.61.62
18c9428f5ed837e027c6fcf29afe9d1f63a1e1e5b53ee1dc6373cf1cd1ea22aa
243a1c7c64da6f60be60db0fe8603cf6a3ba4b30245ce3e3df312229c85ee40c
44c76ee90ab9fc521b9f458489b33855133d86119c7e1fe2228918b2da663f81
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93
8ccea9cb8f9aa73d4f0c1666edb87685b74ffa482059caa0ae688646801a4392
a3195c32223d26b58679477a416061d223424f839d9a8f41dc82c4d9fee25a59
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
c007d73792ac2d25882bfbb573e700e721a0adacfab947e6a0b64a61991fecf0