lexar.icu
Open in
urlscan Pro
68.65.122.201
Malicious Activity!
Public Scan
Effective URL: https://lexar.icu/emscoelectric/14/login.php?cmd=login_submit&id=b27ee32c692044fed3a932790da60914b27ee32c692044fed...
Submission: On January 14 via manual from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 13th 2020. Valid for: a year.
This is the only time lexar.icu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 10 | 68.65.122.201 68.65.122.201 | 22612 (NAMECHEAP...) (NAMECHEAP-NET - Namecheap) | |
1 | 2a00:1450:400... 2a00:1450:4001:825::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:815::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
10 | 3 |
ASN22612 (NAMECHEAP-NET - Namecheap, Inc., US)
PTR: premium24-1.web-hosting.com
lexar.icu |
ASN15169 (GOOGLE - Google LLC, US)
fonts.googleapis.com |
ASN15169 (GOOGLE - Google LLC, US)
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
lexar.icu
2 redirects
lexar.icu |
217 KB |
1 |
gstatic.com
fonts.gstatic.com |
9 KB |
1 |
googleapis.com
fonts.googleapis.com |
860 B |
10 | 3 |
Domain | Requested by | |
---|---|---|
10 | lexar.icu |
2 redirects
lexar.icu
|
1 | fonts.gstatic.com |
lexar.icu
|
1 | fonts.googleapis.com |
lexar.icu
|
10 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
lexar.icu Sectigo RSA Domain Validation Secure Server CA |
2020-01-13 - 2021-01-12 |
a year | crt.sh |
*.storage.googleapis.com GTS CA 1O1 |
2019-12-10 - 2020-03-03 |
3 months | crt.sh |
*.google.com GTS CA 1O1 |
2019-12-20 - 2020-03-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://lexar.icu/emscoelectric/14/login.php?cmd=login_submit&id=b27ee32c692044fed3a932790da60914b27ee32c692044fed3a932790da60914&session=b27ee32c692044fed3a932790da60914b27ee32c692044fed3a932790da60914
Frame ID: 9F59F5DEDE6DE068528485D28B173ED0
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://lexar.icu/emscoelectric/14
HTTP 301
https://lexar.icu/emscoelectric/14/ HTTP 302
https://lexar.icu/emscoelectric/14/login.php?cmd=login_submit&id=b27ee32c692044fed3a932790da60... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://lexar.icu/emscoelectric/14
HTTP 301
https://lexar.icu/emscoelectric/14/ HTTP 302
https://lexar.icu/emscoelectric/14/login.php?cmd=login_submit&id=b27ee32c692044fed3a932790da60914b27ee32c692044fed3a932790da60914&session=b27ee32c692044fed3a932790da60914b27ee32c692044fed3a932790da60914 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
lexar.icu/emscoelectric/14/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
lexar.icu/emscoelectric/14/images/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
lexar.icu/emscoelectric/14/images/ |
61 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
office.jpg
lexar.icu/emscoelectric/14/images/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
other.jpg
lexar.icu/emscoelectric/14/images/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js.download
lexar.icu/emscoelectric/14/images/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
12 KB 860 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
log-bg.jpg
lexar.icu/emscoelectric/14/images/ |
81 KB 82 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cloud2.png
lexar.icu/emscoelectric/14/images/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) OneDrive (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| window_opener_xc function| get_extra_data0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
lexar.icu
2a00:1450:4001:815::2003
2a00:1450:4001:825::200a
68.65.122.201
0a4dae67d3ec68363a0262bca63ffb6bb95d580d383560cd04292d3da83ed23a
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
6892e109d3e3c166224630653893a60fa47b2dfd448e6d0c83887ecf6cb428af
69027204f18bef3a3126cad6b61a5a480f8c3f1b7cf29b5739df72a18039b1b7
72bec2f28d05fc463d2131e5767e722284ae4f756827505dcacd5a6b41344dd5
7976b777c1a1d694739e57292d1629d371aa79be6d7a2a87bcb0d0b9edad79f2
a880eee5c6be17aa4fcb127339b43154411627c9f8b69be2021ee3611d48fdb5
b837437b93bede28b090108d7d0612c88b65a543bf6b924d0586bf552fefccac
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
bedcbef0141493931f41db1b4410c80f62812f1d5a5f98de10fcfe4da57e994d