www.apple-app-billing.com Open in urlscan Pro
193.29.104.49  Malicious Activity! Public Scan

URL: https://www.apple-app-billing.com/data.php
Submission: On February 22 via automatic, source openphish — Scanned from FR

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 7 HTTP transactions. The main IP is 193.29.104.49, located in Paris, France and belongs to M247, RO. The main domain is www.apple-app-billing.com.
TLS certificate: Issued by R3 on February 22nd 2024. Valid for: 3 months.
This is the only time www.apple-app-billing.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Apple (Online)

Domain & IP information

IP Address AS Autonomous System
4 193.29.104.49 9009 (M247)
7 2
Apex Domain
Subdomains
Transfer
4 apple-app-billing.com
www.apple-app-billing.com
839 KB
0 Failed
function sub() { [native code] }. Failed
7 2
Domain Requested by
4 www.apple-app-billing.com www.apple-app-billing.com
0 127.0.0.1 Failed www.apple-app-billing.com
0 lgmpcpglpngdoalbgeoldeajfclnhafa Failed www.apple-app-billing.com
7 3

This site contains links to these domains. Also see Links.

Domain
www.icloud.com
www.apple.com
Subject Issuer Validity Valid
apple-app-billing.com
R3
2024-02-22 -
2024-05-22
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.apple-app-billing.com/data.php
Frame ID: EAD77B56E76DD684B55B50F7A227BF63
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

iCloud

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

7
Requests

57 %
HTTPS

0 %
IPv6

2
Domains

3
Subdomains

2
IPs

1
Countries

839 kB
Transfer

886 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request data.php
www.apple-app-billing.com/
57 KB
10 KB
Document
General
Full URL
https://www.apple-app-billing.com/data.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
193.29.104.49 Paris, France, ASN9009 (M247, RO),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
8a4a5caf158d41bcc5fd25ac1710ff9710d08054135e7206da90c70ed78c4b74

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.57 Safari/537.36
accept-language
fr-FR,fr;q=0.9

Response headers

Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Thu, 22 Feb 2024 13:07:33 GMT
Server
nginx/1.14.0 (Ubuntu)
Transfer-Encoding
chunked
inpage.js
lgmpcpglpngdoalbgeoldeajfclnhafa/
0
0

main.css
www.apple-app-billing.com/
0
0
Stylesheet
General
Full URL
https://www.apple-app-billing.com/main.css
Requested by
Host: www.apple-app-billing.com
URL: https://www.apple-app-billing.com/data.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
193.29.104.49 Paris, France, ASN9009 (M247, RO),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash

Request headers

accept-language
fr-FR,fr;q=0.9
Referer
https://www.apple-app-billing.com/data.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.57 Safari/537.36

Response headers

Date
Thu, 22 Feb 2024 13:07:33 GMT
Content-Encoding
gzip
Server
nginx/1.14.0 (Ubuntu)
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
text/html
saved_resource
www.apple-app-billing.com/files/
0
0
Stylesheet
General
Full URL
https://www.apple-app-billing.com/files/saved_resource
Requested by
Host: www.apple-app-billing.com
URL: https://www.apple-app-billing.com/data.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
193.29.104.49 Paris, France, ASN9009 (M247, RO),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash

Request headers

accept-language
fr-FR,fr;q=0.9
Referer
https://www.apple-app-billing.com/data.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.57 Safari/537.36

Response headers

Date
Thu, 22 Feb 2024 13:07:33 GMT
Content-Encoding
gzip
Server
nginx/1.14.0 (Ubuntu)
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
text/html
main-data.css
www.apple-app-billing.com/files/
829 KB
829 KB
Stylesheet
General
Full URL
https://www.apple-app-billing.com/files/main-data.css
Requested by
Host: www.apple-app-billing.com
URL: https://www.apple-app-billing.com/data.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
193.29.104.49 Paris, France, ASN9009 (M247, RO),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
3cf8b536e0cac4d085a4eaae4de70db152a38a53968ac2818d5a47e2160b5a0d

Request headers

accept-language
fr-FR,fr;q=0.9
Referer
https://www.apple-app-billing.com/data.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.57 Safari/537.36

Response headers

Date
Thu, 22 Feb 2024 13:07:33 GMT
Last-Modified
Fri, 26 Jan 2024 21:17:50 GMT
Server
nginx/1.14.0 (Ubuntu)
ETag
"65b4217e-cf2ba"
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
848570
inpage.js
lgmpcpglpngdoalbgeoldeajfclnhafa/
0
0

truncated
/
798 B
0
Stylesheet
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
324b2843254e36a375dafbdcebc53d03275275e61811711cc763091e3df741cc

Request headers

accept-language
fr-FR,fr;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.57 Safari/537.36

Response headers

Content-Type
text/css
HR_gradient_dark.png
127.0.0.1/bin/cb1633718600/dist/assets/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
lgmpcpglpngdoalbgeoldeajfclnhafa
URL
chrome-extension://lgmpcpglpngdoalbgeoldeajfclnhafa/inpage.js
Domain
lgmpcpglpngdoalbgeoldeajfclnhafa
URL
chrome-extension://lgmpcpglpngdoalbgeoldeajfclnhafa/inpage.js
Domain
127.0.0.1
URL
http://127.0.0.1/bin/cb1633718600/dist/assets/HR_gradient_dark.png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Apple (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| formatDOB

0 Cookies

5 Console Messages

Source Level URL
Text
network error URL: chrome-extension://lgmpcpglpngdoalbgeoldeajfclnhafa/inpage.js
Message:
Failed to load resource: net::ERR_UNKNOWN_URL_SCHEME
network error URL: chrome-extension://lgmpcpglpngdoalbgeoldeajfclnhafa/inpage.js
Message:
Failed to load resource: net::ERR_UNKNOWN_URL_SCHEME
network error URL: https://www.apple-app-billing.com/main.css
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)
network error URL: https://www.apple-app-billing.com/files/saved_resource
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)
security warning URL: https://www.apple-app-billing.com/data.php(Line 901)
Message:
Mixed Content: The page at 'https://www.apple-app-billing.com/data.php' was loaded over HTTPS, but requested an insecure element 'http://127.0.0.1/bin/cb1633718600/dist/assets/HR_gradient_dark.png'. This request was not upgraded to HTTPS because its URL's host is an IP address.