crocusterminal.ru Open in urlscan Pro
77.108.119.51  Malicious Activity! Public Scan

URL: http://crocusterminal.ru/civilian/hot/newzone/hox.html
Submission: On November 02 via automatic, source openphish

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 4 HTTP transactions. The main IP is 77.108.119.51, located in Zelenograd, Russian Federation and belongs to COMCOR-AS Moscow, RU. The main domain is crocusterminal.ru.
This is the only time crocusterminal.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
2 77.108.119.51 8732 (COMCOR-AS...)
1 2a02:26f0:122... 20940 (AKAMAI-ASN1)
1 2a02:26f0:122... 20940 (AKAMAI-ASN1)
4 3
Apex Domain
Subdomains
Transfer
2 gfx.ms
auth.gfx.ms
5 KB
2 crocusterminal.ru
crocusterminal.ru
77 KB
4 2
Domain Requested by
2 auth.gfx.ms crocusterminal.ru
2 crocusterminal.ru crocusterminal.ru
4 2

This site contains no links.

Subject Issuer Validity Valid
msagfx.live.com
Microsoft IT TLS CA 4
2017-07-27 -
2019-07-17
2 years crt.sh

This page contains 1 frames:

Primary Page: http://crocusterminal.ru/civilian/hot/newzone/hox.html
Frame ID: 20439.1
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /php\/?([\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:^|\s)Python(?:\/([\d.]+))?/i
  • headers server /mod_wsgi(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /CentOS/i

Overall confidence: 100%
Detected patterns
  • headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Overall confidence: 100%
Detected patterns
  • headers server /mod_wsgi(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
  • headers server /mod_wsgi(?:\/([\d.]+))?/i

Page Statistics

4
Requests

50 %
HTTPS

67 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

82 kB
Transfer

89 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request hox.html
crocusterminal.ru/civilian/hot/newzone/
5 KB
5 KB
Document
General
Full URL
http://crocusterminal.ru/civilian/hot/newzone/hox.html
Protocol
HTTP/1.1
Server
77.108.119.51 Zelenograd, Russian Federation, ASN8732 (COMCOR-AS Moscow, RU),
Reverse DNS
ns.crocusterminal.ru
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 mod_wsgi/3.4 Python/2.7.5 /
Resource Hash
bc56f12b34c1161cdd5f0252d5139aaee87b41da3e10cf5d3222c7a688446ffb

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
crocusterminal.ru
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Thu, 02 Nov 2017 23:11:24 GMT
Last-Modified
Tue, 12 Jul 2016 18:46:42 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 mod_wsgi/3.4 Python/2.7.5
ETag
"132d-53774b0976880"
Content-Type
text/html; charset=UTF-8
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4909
Default1033.css
crocusterminal.ru/civilian/hot/newzone/hox_files/
72 KB
72 KB
Stylesheet
General
Full URL
http://crocusterminal.ru/civilian/hot/newzone/hox_files/Default1033.css
Requested by
Host: crocusterminal.ru
URL: http://crocusterminal.ru/civilian/hot/newzone/hox.html
Protocol
HTTP/1.1
Server
77.108.119.51 Zelenograd, Russian Federation, ASN8732 (COMCOR-AS Moscow, RU),
Reverse DNS
ns.crocusterminal.ru
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 mod_wsgi/3.4 Python/2.7.5 /
Resource Hash
1a3260d3f45c88e326e046374ab737a0631de1c5a866913eb2c8acacf370d7ec

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
crocusterminal.ru
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://crocusterminal.ru/civilian/hot/newzone/hox.html
Connection
keep-alive
Cache-Control
no-cache
Referer
http://crocusterminal.ru/civilian/hot/newzone/hox.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Thu, 02 Nov 2017 23:11:24 GMT
Last-Modified
Wed, 11 May 2016 00:53:42 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 mod_wsgi/3.4 Python/2.7.5
ETag
"11fff-5328679155180"
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
73727
AppCentipede_Microsoft.svg
auth.gfx.ms/16.000.26281.00/AppCentipede/
7 KB
3 KB
Image
General
Full URL
https://auth.gfx.ms/16.000.26281.00/AppCentipede/AppCentipede_Microsoft.svg
Requested by
Host: crocusterminal.ru
URL: http://crocusterminal.ru/civilian/hot/newzone/hox.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:122:399::34ef , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Microsoft-IIS/8.5 /
Resource Hash
bde5e27f76f371121f1955806f1b662f323f3793b079455f5bfe83365a393625

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
auth.gfx.ms
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://crocusterminal.ru/civilian/hot/newzone/hox.html
Connection
keep-alive
Cache-Control
no-cache
Referer
http://crocusterminal.ru/civilian/hot/newzone/hox.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Thu, 02 Nov 2017 23:11:25 GMT
Content-Encoding
gzip
Last-Modified
Tue, 10 Nov 2015 05:54:06 GMT
PPServer
PPV: 30 H: BL2IDSPRTS1A002 V: 0
ETag
"0939f357c1bd11:0"
Vary
Accept-Encoding
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2946
Server
Microsoft-IIS/8.5
Microsoft_Logotype_Gray.svg
auth.gfx.ms/16.000.26281.00/
5 KB
2 KB
Image
General
Full URL
https://auth.gfx.ms/16.000.26281.00/Microsoft_Logotype_Gray.svg
Requested by
Host: crocusterminal.ru
URL: http://crocusterminal.ru/civilian/hot/newzone/hox.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:122:394::34ef , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Microsoft-IIS/8.5 /
Resource Hash
356f7d1241f92c9de9c9cfd0bebb6c10d1b38508a3f37cebc26329c656bad19f

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
auth.gfx.ms
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://crocusterminal.ru/civilian/hot/newzone/hox.html
Connection
keep-alive
Cache-Control
no-cache
Referer
http://crocusterminal.ru/civilian/hot/newzone/hox.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Thu, 02 Nov 2017 23:11:24 GMT
Content-Encoding
gzip
Last-Modified
Tue, 10 Nov 2015 05:54:06 GMT
PPServer
PPV: 30 H: BL2IDSPRTS1C002 V: 0
ETag
"0939f357c1bd11:0"
Vary
Accept-Encoding
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Cache-Control
max-age=592154
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2160
Server
Microsoft-IIS/8.5

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies