buai.my
Open in
urlscan Pro
112.137.167.223
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On June 10 via api from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 18th 2019. Valid for: a year.
This is the only time buai.my was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 112.137.167.223 112.137.167.223 | 17971 (TMVADS-AP...) (TMVADS-AP TM-VADS DC Hosting) | |
1 | 2606:4700::68... 2606:4700::6813:c697 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2.18.232.222 2.18.232.222 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
9 | 3 |
ASN17971 (TMVADS-AP TM-VADS DC Hosting, MY)
PTR: srv2.edorey.com
buai.my |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a2-18-232-222.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
buai.my
buai.my |
433 KB |
1 |
paypalobjects.com
www.paypalobjects.com |
2 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
73 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
7 | buai.my |
buai.my
|
1 | www.paypalobjects.com |
buai.my
|
1 | cdnjs.cloudflare.com |
buai.my
|
9 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.paypal.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
buai.my Sectigo RSA Domain Validation Secure Server CA |
2019-01-18 - 2020-01-18 |
a year | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-03-02 - 2019-09-08 |
6 months | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2018-08-14 - 2020-08-18 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://buai.my/ver/signin.php
Frame ID: 0299D7CA5287448542C0415D90DD58B5
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Backbone.js (JavaScript Frameworks) Expand
Detected patterns
- env /^Backbone$/i
PayPal (Payment Processors) Expand
Detected patterns
- env /^PAYPAL$/i
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- script /require.*\.js/i
- env /^requirejs$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Underscore.js (JavaScript Libraries) Expand
Detected patterns
- env /^Backbone$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
signin.php
buai.my/ver/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
buai.my/ver/lib/ |
38 KB 38 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.1.0/ |
258 KB 73 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
crypt.js
buai.my/ver/js/ |
20 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.js
buai.my/ver/lib/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
require.js
buai.my/ver/lib/ |
15 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app_.js
buai.my/ver/lib/ |
288 KB 289 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pa.js
buai.my/ver/lib/ |
66 KB 67 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial) Generic (Online)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery object| Aes object| Base64 object| Utf8 object| _0xce15 function| require function| requirejs function| define function| getGlobal object| dust function| extend function| _ object| Backbone object| PAYPAL object| jQuery180011472149507601159 object| fpti string| fptiserverurl boolean| webkit1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
buai.my/ | Name: PHPSESSID Value: 4v8pn5jll4eflcumfo8c0ek9o0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
buai.my
cdnjs.cloudflare.com
www.paypalobjects.com
112.137.167.223
2.18.232.222
2606:4700::6813:c697
4d67be3098fe33e8d2a27c5d28dc1ecc214f94afa77740f8c9ff7848edbe93f8
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8
98ecaad59fce14516bd1c79d6361e1f798a6cf3d077b68b5807adc153c5fb389
a69d9129779b4f56bec86f110934bf96e884af4c4f51d83c42fefc906240e95b
b25a2092f0752b754e933008f10213c55dd5ce93a791e355b0abed9182cc8df9
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
bce5af51a37543cd46614e90db944fbce529806f0a22c786e3454da7131c782b
c007d73792ac2d25882bfbb573e700e721a0adacfab947e6a0b64a61991fecf0
c8c0595b709d3b91af6b173aa2f7027eee3fb617bd45d94ad61654f45564d4c6