![](/screenshots/dddfc7bd-1143-46c7-9a21-d0e5293e0a63.png)
enoragroup.com
Open in
urlscan Pro
160.153.128.35
Malicious Activity!
Public Scan
Effective URL: https://enoragroup.com/farm/Site1/authenticate/login.php?ss=2&ea=6736f77656e734073656e6563612d736f6c7574696f6e732e636f6d
Submission: On March 23 via manual from US
Summary
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on June 30th 2020. Valid for: a year.
This is the only time enoragroup.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 66.85.47.5 66.85.47.5 | 393960 (HOST4GEEK...) (HOST4GEEKS-LLC) | |
1 1 | 67.210.244.162 67.210.244.162 | 7819 (GLOBAL-IP...) (GLOBAL-IP-NETWORKS) | |
2 7 | 160.153.128.35 160.153.128.35 | 20773 (GODADDY) (GODADDY) | |
2 | 2a02:26f0:10c... 2a02:26f0:10c:58f::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
8 | 3 |
ASN393960 (HOST4GEEKS-LLC, US)
PTR: server2.websiteserverbox.com
sowens.cliffsam.co.ke |
ASN7819 (GLOBAL-IP-NETWORKS, US)
PTR: exodo.colombiahosting.com.co
www.menteaktiva.com |
ASN20773 (GODADDY, DE)
PTR: ip-160-153-128-35.ip.secureserver.net
enoragroup.com |
ASN20940 (AKAMAI-ASN1, NL)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
enoragroup.com
2 redirects
enoragroup.com |
34 KB |
2 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
268 KB |
1 |
menteaktiva.com
1 redirects
www.menteaktiva.com |
187 B |
1 |
cliffsam.co.ke
sowens.cliffsam.co.ke |
510 B |
8 | 4 |
Domain | Requested by | |
---|---|---|
7 | enoragroup.com |
2 redirects
sowens.cliffsam.co.ke
enoragroup.com |
2 | secure.aadcdn.microsoftonline-p.com |
enoragroup.com
|
1 | www.menteaktiva.com | 1 redirects |
1 | sowens.cliffsam.co.ke | |
8 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
enoragroup.com Go Daddy Secure Certificate Authority - G2 |
2020-06-30 - 2021-06-30 |
a year | crt.sh |
secure.aadcdn.microsoftonline-p.com Microsoft RSA TLS CA 01 |
2020-12-22 - 2021-12-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://enoragroup.com/farm/Site1/authenticate/login.php?ss=2&ea=6736f77656e734073656e6563612d736f6c7574696f6e732e636f6d
Frame ID: D3909E5C903CC38D3C0B64530196B17B
Requests: 8 HTTP requests in this frame
Screenshot
![](/screenshots/dddfc7bd-1143-46c7-9a21-d0e5293e0a63.png)
Page URL History Show full URLs
- http://sowens.cliffsam.co.ke/ Page URL
-
https://www.menteaktiva.com/prueba/bull1/6736f77656e734073656e6563612d736f6c7574696f6e732e636f6d
HTTP 302
https://enoragroup.com/farm/Site1/authenticate?ss=2&ea=6736f77656e734073656e6563612d736f6c7574696f6... HTTP 301
https://enoragroup.com/farm/Site1/authenticate/?ss=2&ea=6736f77656e734073656e6563612d736f6c7574696f... HTTP 302
https://enoragroup.com/farm/Site1/authenticate/login.php?ss=2&ea=6736f77656e734073656e6563612d736f6... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://sowens.cliffsam.co.ke/ Page URL
-
https://www.menteaktiva.com/prueba/bull1/6736f77656e734073656e6563612d736f6c7574696f6e732e636f6d
HTTP 302
https://enoragroup.com/farm/Site1/authenticate?ss=2&ea=6736f77656e734073656e6563612d736f6c7574696f6e732e636f6d HTTP 301
https://enoragroup.com/farm/Site1/authenticate/?ss=2&ea=6736f77656e734073656e6563612d736f6c7574696f6e732e636f6d HTTP 302
https://enoragroup.com/farm/Site1/authenticate/login.php?ss=2&ea=6736f77656e734073656e6563612d736f6c7574696f6e732e636f6d Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
sowens.cliffsam.co.ke/ |
251 B 510 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
enoragroup.com/farm/Site1/authenticate/ Redirect Chain
|
15 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
enc.js
enoragroup.com/farm/Site1/authenticate/files/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Converged1033.css
enoragroup.com/farm/Site1/authenticate/files/ |
99 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bannerlogo
secure.aadcdn.microsoftonline-p.com/dbd5a2dd-uwr56gghzai50jz20tgaud4jqdx4yfcohyazriua1eu/logintenantbranding/0/ |
10 KB 10 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left.png
enoragroup.com/farm/Site1/authenticate/files/ |
240 B 300 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1-small.jpg
enoragroup.com/farm/Site1/authenticate/files2/ |
987 B 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
illustration
secure.aadcdn.microsoftonline-p.com/dbd5a2dd-uwr56gghzai50jz20tgaud4jqdx4yfcohyazriua1eu/logintenantbranding/0/ |
258 KB 258 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| Aes object| Base64 object| Utf8 string| gentot string| udud string| keluaran string| ctrTxt function| empty function| change function| myFunction2 function| myFunction object| form object| button0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
enoragroup.com
secure.aadcdn.microsoftonline-p.com
sowens.cliffsam.co.ke
www.menteaktiva.com
160.153.128.35
2a02:26f0:10c:58f::35c1
66.85.47.5
67.210.244.162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