femmefatale.com.pk Open in urlscan Pro
192.185.46.250  Malicious Activity! Public Scan

Submitted URL: https://vrimrcenter.com/nhdgf?Ui3___=
Effective URL: https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa146...
Submission: On November 15 via manual from HK

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 192.185.46.250, located in Houston, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is femmefatale.com.pk.
TLS certificate: Issued by Let's Encrypt Authority X3 on November 12th 2019. Valid for: 3 months.
This is the only time femmefatale.com.pk was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
2 2 45.74.26.148 35017 (SWIFTWAY-...)
2 7 192.185.46.250 46606 (UNIFIEDLA...)
5 1
Apex Domain
Subdomains
Transfer
7 femmefatale.com.pk
femmefatale.com.pk
341 KB
2 vrimrcenter.com
vrimrcenter.com
506 B
5 2
Domain Requested by
7 femmefatale.com.pk 2 redirects femmefatale.com.pk
2 vrimrcenter.com 2 redirects
5 2

This site contains no links.

Subject Issuer Validity Valid
femmefatale.com.pk
Let's Encrypt Authority X3
2019-11-12 -
2020-02-10
3 months crt.sh

This page contains 1 frames:

Primary Page: https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
Frame ID: 868A149FBAC95A6A7DBA5B38894BDE4A
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://vrimrcenter.com/nhdgf?Ui3___= HTTP 301
    https://vrimrcenter.com/nhdgf/?Ui3___= HTTP 302
    https://femmefatale.com.pk/jhk?AP___= HTTP 301
    https://femmefatale.com.pk/jhk/?AP___= HTTP 302
    https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

5
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

341 kB
Transfer

396 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://vrimrcenter.com/nhdgf?Ui3___= HTTP 301
    https://vrimrcenter.com/nhdgf/?Ui3___= HTTP 302
    https://femmefatale.com.pk/jhk?AP___= HTTP 301
    https://femmefatale.com.pk/jhk/?AP___= HTTP 302
    https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request fejcqpgevsuzxeoe21n3lxbp.php
femmefatale.com.pk/jhk/
Redirect Chain
  • https://vrimrcenter.com/nhdgf?Ui3___=
  • https://vrimrcenter.com/nhdgf/?Ui3___=
  • https://femmefatale.com.pk/jhk?AP___=
  • https://femmefatale.com.pk/jhk/?AP___=
  • https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f...
3 KB
1 KB
Document
General
Full URL
https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.185.46.250 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
mail.triumphpi.com
Software
nginx/1.17.3 /
Resource Hash
622e74a3044e6795e57640683d0e980053c5fb6adb016d53e22dd3fec3ba07d7

Request headers

:method
GET
:authority
femmefatale.com.pk
:scheme
https
:path
/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
date
Fri, 15 Nov 2019 12:16:13 GMT
server
nginx/1.17.3
content-type
text/html
content-length
1116
cache-control
max-age=300
expires
Fri, 15 Nov 2019 12:21:13 GMT
vary
Accept-Encoding
content-encoding
gzip
x-endurance-cache-level
2
x-server-cache
false

Redirect headers

status
302
date
Fri, 15 Nov 2019 12:16:13 GMT
server
nginx/1.17.3
content-type
text/html
content-length
0
location
fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
cache-control
max-age=300
expires
Fri, 15 Nov 2019 12:21:12 GMT
x-endurance-cache-level
2
x-server-cache
false
style.css
femmefatale.com.pk/jhk/
6 KB
2 KB
Stylesheet
General
Full URL
https://femmefatale.com.pk/jhk/style.css
Requested by
Host: femmefatale.com.pk
URL: https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.185.46.250 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
mail.triumphpi.com
Software
nginx/1.17.3 /
Resource Hash
f3a3435dd1e14ea7ec192be880befce0c60c18a1dd6161f3a66cb82e9b358002

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 15 Nov 2019 12:16:14 GMT
content-encoding
gzip
last-modified
Sat, 15 Dec 2018 18:09:32 GMT
server
nginx/1.17.3
x-server-cache
false
vary
Accept-Encoding
x-endurance-cache-level
2
content-type
text/css
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
1864
expires
Sun, 15 Dec 2019 12:16:14 GMT
jquery.js
femmefatale.com.pk/jhk/js/
94 KB
42 KB
Script
General
Full URL
https://femmefatale.com.pk/jhk/js/jquery.js
Requested by
Host: femmefatale.com.pk
URL: https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.185.46.250 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
mail.triumphpi.com
Software
nginx/1.17.3 /
Resource Hash
91222f96f34735ebc88df208017e54d4329b9202e3e52367fb8b149698a1a5ef

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 15 Nov 2019 12:16:14 GMT
content-encoding
gzip
last-modified
Sat, 15 Dec 2018 18:09:32 GMT
server
nginx/1.17.3
x-server-cache
false
vary
Accept-Encoding
x-endurance-cache-level
2
content-type
application/javascript
status
200
cache-control
max-age=21600
accept-ranges
bytes
expires
Fri, 15 Nov 2019 18:16:14 GMT
ms-logo-v2.jpg
femmefatale.com.pk/jhk/images/
3 KB
3 KB
Image
General
Full URL
https://femmefatale.com.pk/jhk/images/ms-logo-v2.jpg
Requested by
Host: femmefatale.com.pk
URL: https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.185.46.250 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
mail.triumphpi.com
Software
nginx/1.17.3 /
Resource Hash
bc2b16b51738b77d94ed7591ad1033fa804297ca9faaa35222aa65773f749164

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://femmefatale.com.pk/jhk/fejcqpgevsuzxeoe21n3lxbp.php?F76K0A157382017343c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec43c21e51abfa1469985ae1f1f02d96ec&AP___=&error=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 15 Nov 2019 12:16:14 GMT
last-modified
Sat, 15 Dec 2018 18:09:32 GMT
server
nginx/1.17.3
x-server-cache
false
x-endurance-cache-level
2
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
2797
expires
Sat, 14 Nov 2020 12:16:14 GMT
0.jpg
femmefatale.com.pk/jhk/images/
291 KB
293 KB
Image
General
Full URL
https://femmefatale.com.pk/jhk/images/0.jpg
Requested by
Host: femmefatale.com.pk
URL: https://femmefatale.com.pk/jhk/js/jquery.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.185.46.250 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
mail.triumphpi.com
Software
nginx/1.17.3 /
Resource Hash
62faab60433070e2ea52c235f0f18db228759f2a08bb6f9e5711630df8321214

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://femmefatale.com.pk/jhk/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 15 Nov 2019 12:16:14 GMT
last-modified
Sat, 15 Dec 2018 18:09:32 GMT
server
nginx/1.17.3
x-server-cache
false
x-endurance-cache-level
2
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
298105
expires
Sat, 14 Nov 2020 12:16:14 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery function| isValidEmailAddress

0 Cookies