boonruksashop.com
Open in
urlscan Pro
119.59.96.62
Malicious Activity!
Public Scan
Submission: On March 14 via manual from IN — Scanned from IT
Summary
TLS certificate: Issued by R3 on February 27th 2024. Valid for: 3 months.
This is the only time boonruksashop.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: American Express (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 119.59.96.62 119.59.96.62 | 56067 (METRABYTE...) (METRABYTE-TH 453 Ladplacout Jorakhaebua) | |
3 | 104.21.234.230 104.21.234.230 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 142.250.185.170 142.250.185.170 | 15169 (GOOGLE) (GOOGLE) | |
1 | 139.71.16.29 139.71.16.29 | 6307 (AMERICAN-...) (AMERICAN-EXPRESS) | |
3 | 23.212.203.180 23.212.203.180 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
9 | 5 |
ASN56067 (METRABYTE-TH 453 Ladplacout Jorakhaebua, TH)
PTR: 96.62.hostinglotus.cloud
boonruksashop.com |
ASN15169 (GOOGLE, US)
PTR: fra16s51-in-f10.1e100.net
ajax.googleapis.com |
ASN6307 (AMERICAN-EXPRESS, US)
PTR: cdaas2.americanexpress.com
cdaas.americanexpress.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-212-203-180.deploy.static.akamaitechnologies.com
www.aexp-static.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
aexp-static.com
www.aexp-static.com — Cisco Umbrella Rank: 13251 |
108 KB |
3 |
githack.com
rawcdn.githack.com — Cisco Umbrella Rank: 62261 |
140 KB |
1 |
americanexpress.com
cdaas.americanexpress.com — Cisco Umbrella Rank: 36551 |
11 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 368 |
86 KB |
1 |
boonruksashop.com
boonruksashop.com |
9 KB |
9 | 5 |
Domain | Requested by | |
---|---|---|
3 | www.aexp-static.com |
rawcdn.githack.com
|
3 | rawcdn.githack.com |
boonruksashop.com
|
1 | cdaas.americanexpress.com |
rawcdn.githack.com
|
1 | ajax.googleapis.com |
boonruksashop.com
|
1 | boonruksashop.com | |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
boonruksashop.com R3 |
2024-02-27 - 2024-05-27 |
3 months | crt.sh |
githack.com GTS CA 1P5 |
2024-03-01 - 2024-05-30 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-02-19 - 2024-05-13 |
3 months | crt.sh |
cdaas.americanexpress.com DigiCert SHA2 Extended Validation Server CA |
2023-10-11 - 2024-10-09 |
a year | crt.sh |
m.americanexpress.com DigiCert EV RSA CA G2 |
2023-04-05 - 2024-04-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://boonruksashop.com/Home/?auth-2e0f4ceda3e4cd80e421f6c40e54366b4aa50a83a941bfd9a629feeedd80ae513aa92fa341d6f1c244d197048790a3eb9df974ba0d86c43c6b8904636875be64a9d0026f78043f542eedba70a53eed86f7d3125cfd05020
Frame ID: D9BE619952331ED1816587C215A9EE9F
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
1 - 2 | American ExpressDetected technologies
Amex Express Checkout (Payment processors) ExpandDetected patterns
- aexp-static\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
boonruksashop.com/Home/ |
9 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-min.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
285 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-fonts.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
207 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-font.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
104 KB 69 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.7.1/ |
85 KB 86 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amex-desktop-logo.png
cdaas.americanexpress.com/myca/oce/latest/content/images/common/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0fababca-4914-46dd-9b0f-efbd51f67ae8-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
37 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3be50273-0b2e-4aef-ae68-882eacd611f9-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
36 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dls-icons.woff
www.aexp-static.com/cdaas/one/statics/axp-dls/5.10.1/package/dist/iconfont/ |
34 KB 34 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: American Express (Financial)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
boonruksashop.com
cdaas.americanexpress.com
rawcdn.githack.com
www.aexp-static.com
104.21.234.230
119.59.96.62
139.71.16.29
142.250.185.170
23.212.203.180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