festivalgrain.com
Open in
urlscan Pro
141.98.5.158
Malicious Activity!
Public Scan
Submission Tags: https://phish.report @phish_report Search All
Submission: On July 18 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by R3 on July 7th 2023. Valid for: 3 months.
This is the only time festivalgrain.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 5 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 141.98.5.158 141.98.5.158 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL) | |
1 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
festivalgrain.com
festivalgrain.com |
138 B |
1 | 1 |
Domain | Requested by | |
---|---|---|
1 | festivalgrain.com | |
1 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
festivalgrain.com R3 |
2023-07-07 - 2023-10-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://festivalgrain.com/0/0/0/75532c03276be3c7b2db558dc23db6/7/2023-07-17%2008:55:07_725_120032..
Frame ID: 34E2E3D238A7E32B6548BD25EB5299BF
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
2023-07-17%2008:55:07_725_120032..
festivalgrain.com/0/0/0/75532c03276be3c7b2db558dc23db6/7/ |
0 138 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
July 24th 2023, 2:56:43 am
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN MALWARE sent by large botnet targeting email addresses obtained from DATA BREACH using malicious websites: https://festivalgrain.com/0/0/0/1607d1d8881c0f1406ecdaef3d951983/7/2023-07-23%2007:52:07_768_1283970_3109927_10/4 https://maleenhancement.cfd https://trkendo.com https://thehiddenorgan.com https://h-eshop.store https://www.greywish.com http://tracking.cholibrium-at.com http://cholibrium.com
Malicious
page.url
Submitted on
July 21st 2023, 1:02:57 am
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN MALWARE sent by large botnet targeting email addresses obtained from DATA BREACH using malicious websites: https://festivalgrain.com/0/0/0/1607d1d8881c0f1406ecdaef3d951983/7/2023-07-19%2017:27:44_744_1246530_544226_10/4 https://tinyurl.com/2mq3opfn https://s-1689810969.picotur.live https://clk.picotur.live https://festivalgrain.com https://fumbleroads.com https://planebale.com https://errantjumper.live
Malicious
page.url
Submitted on
July 18th 2023, 11:27:19 pm
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN MALWARE sent by large botnet targeting email addresses obtained from DATA BREACH using malicious websites: https://tinyurl.com/2lrjljdz https://s-1689712595.picotur.live https://clk.picotur.live https://errantjumper.live https://planebale.com https://bestblendercanada.com https://earwaxproca.com https://smartwatchtryusa.com
Malicious
page.url
Submitted on
July 18th 2023, 12:31:49 pm
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN SCAMMERS obtained email addresses from DATA BREACH and are hosting SCAM sites that SPEARPHISH users using obfuscated malicious and/or compromised websites: https://tinyurl.com/2mqndtxp/ https://s-1689608828.picotur.live https://clk.picotur.live https://festivalgrain.com
Malicious
page.url
Submitted on
July 18th 2023, 1:41:33 am
UTC —
From United States
Threats:
Malware
Social Engineering
Spearphishing
Comment: RUSSIAN SCAMMERS obtained email addresses from DATA BREACH and are hosting SCAM sites that SPEARPHISH users: https://festivalgrain.com/0/0/0/75532c03276be3c7b2db558dc23db6/7/2023-07-17%2008:55:07_725_120032.. https://bestblendercanada.com https://campaign.matchshowcase.com https://clk.picotur.live https://earwaxproca.com https://getgummies.naturalessentialextract.com https://planebale.com https://pushingraids.com https://smartwatchtryusa.com https://universalslimer.com
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
festivalgrain.com
141.98.5.158
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855