Submitted URL: http://u16121757.ct.sendgrid.net/ls/click?upn=34deDdOZ535kuVXPZXIePVJTh1TwGBZZ7HLV1sd1jIZ0eppS2GP5ZzJB040AokG-2FpbebGz4CEGhW8k27R...
Effective URL: https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/login.php?email=[[-Email-]]
Submission: On June 09 via manual from GB

Summary

This website contacted 1 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 45.74.14.71, located in Melbourne, Australia and belongs to AS45671-NET-AU Wholesale Services Provider, AU. The main domain is cor.royalaloha.ca.
TLS certificate: Issued by Let's Encrypt Authority X3 on June 3rd 2020. Valid for: 3 months.
This is the only time cor.royalaloha.ca was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: DHL (Transportation)

Domain & IP information

IP Address AS Autonomous System
1 1 167.89.118.35 11377 (SENDGRID)
1 1 66.147.238.141 23535 (HOSTROCKET)
3 45.74.14.71 45671 (AS45671-N...)
3 1
Apex Domain
Subdomains
Transfer
3 royalaloha.ca
cor.royalaloha.ca
15 KB
1 ctsrbcikorodu.org
ctsrbcikorodu.org
566 B
1 sendgrid.net
u16121757.ct.sendgrid.net
288 B
3 3
Domain Requested by
3 cor.royalaloha.ca cor.royalaloha.ca
1 ctsrbcikorodu.org 1 redirects
1 u16121757.ct.sendgrid.net 1 redirects
3 3

This site contains no links.

Subject Issuer Validity Valid
cor.royalaloha.ca
Let's Encrypt Authority X3
2020-06-03 -
2020-09-01
3 months crt.sh

This page contains 1 frames:

Primary Page: https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/login.php?email=[[-Email-]]
Frame ID: 5F51F0D72285BFDE007AC6764E92A40E
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://u16121757.ct.sendgrid.net/ls/click?upn=34deDdOZ535kuVXPZXIePVJTh1TwGBZZ7HLV1sd1jIZ0eppS2GP5ZzJB040AokG... HTTP 302
    https://ctsrbcikorodu.org/wp-content/plugins/dehbkbj/Dhl/redirect/?email=[[-Email-]] HTTP 302
    https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/index.php?rand=13InboxLightaspxn.1774256418... Page URL
  2. https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/login.php?email=[[-Email-]] Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

1
IPs

2
Countries

15 kB
Transfer

14 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://u16121757.ct.sendgrid.net/ls/click?upn=34deDdOZ535kuVXPZXIePVJTh1TwGBZZ7HLV1sd1jIZ0eppS2GP5ZzJB040AokG-2FpbebGz4CEGhW8k27RXpH-2Fj7p2thY33XgqHStO9Ox9RbDBiY3FK7yxGuEr8R858DSMbqO_eMpOHZXHw4RIv4Y1LrT6fi5QTjPBT2L-2BloFJYjZK7LXKhPgUmb3vAFQ0JVllB4OlhyEpKNwzVXHGz8h3UI0NVDes4gfe03OIDIPbozyD-2BVpDwpY1hN1F-2BP1cb9tLHg6V74sJvQHNuk1RDg-2BXcSjBpbLdY369IOrt6k52xVodpoT73zT-2FMkiJSEGQgLRQZOWcswfB9IwTV3i5CGPLX0QuHbmV5dxdBbu4PO2cNEzGe-2FX8k8M78S9wmZze9kdgrLlj HTTP 302
    https://ctsrbcikorodu.org/wp-content/plugins/dehbkbj/Dhl/redirect/?email=[[-Email-]] HTTP 302
    https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=[[-Email-]]&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
  2. https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/login.php?email=[[-Email-]] Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://u16121757.ct.sendgrid.net/ls/click?upn=34deDdOZ535kuVXPZXIePVJTh1TwGBZZ7HLV1sd1jIZ0eppS2GP5ZzJB040AokG-2FpbebGz4CEGhW8k27RXpH-2Fj7p2thY33XgqHStO9Ox9RbDBiY3FK7yxGuEr8R858DSMbqO_eMpOHZXHw4RIv4Y1LrT6fi5QTjPBT2L-2BloFJYjZK7LXKhPgUmb3vAFQ0JVllB4OlhyEpKNwzVXHGz8h3UI0NVDes4gfe03OIDIPbozyD-2BVpDwpY1hN1F-2BP1cb9tLHg6V74sJvQHNuk1RDg-2BXcSjBpbLdY369IOrt6k52xVodpoT73zT-2FMkiJSEGQgLRQZOWcswfB9IwTV3i5CGPLX0QuHbmV5dxdBbu4PO2cNEzGe-2FX8k8M78S9wmZze9kdgrLlj HTTP 302
  • https://ctsrbcikorodu.org/wp-content/plugins/dehbkbj/Dhl/redirect/?email=[[-Email-]] HTTP 302
  • https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=[[-Email-]]&.rand=13InboxLight.aspx?n=1774256418&fid=4

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
index.php
cor.royalaloha.ca/Dhl/dhl_topscript/source/content/
Redirect Chain
  • http://u16121757.ct.sendgrid.net/ls/click?upn=34deDdOZ535kuVXPZXIePVJTh1TwGBZZ7HLV1sd1jIZ0eppS2GP5ZzJB040AokG-2FpbebGz4CEGhW8k27RXpH-2Fj7p2thY33XgqHStO9Ox9RbDBiY3FK7yxGuEr8R858DSMbqO_eMpOHZXHw4RIv4...
  • https://ctsrbcikorodu.org/wp-content/plugins/dehbkbj/Dhl/redirect/?email=[[-Email-]]
  • https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&ema...
128 B
335 B
Document
General
Full URL
https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=[[-Email-]]&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.74.14.71 Melbourne, Australia, ASN45671 (AS45671-NET-AU Wholesale Services Provider, AU),
Reverse DNS
Software
Apache /
Resource Hash
c56c80cb43c36e2c4d23bdbc114ae377c61c58ab900dfeaf30e850cca91f5589

Request headers

Host
cor.royalaloha.ca
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 09 Jun 2020 11:32:40 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

status
302
set-cookie
PHPSESSID=khid2u7qqkdvi39uommal08vl1; path=/; secure
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-cache, no-store, must-revalidate, max-age=0
pragma
no-cache
location
https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=[[-Email-]]&.rand=13InboxLight.aspx?n=1774256418&fid=4#n=1252899642&fid=1&fav=1
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
content-encoding
gzip
date
Tue, 09 Jun 2020 11:32:39 GMT
server
LiteSpeed
alt-svc
quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
Primary Request login.php
cor.royalaloha.ca/Dhl/dhl_topscript/source/content/
10 KB
10 KB
Document
General
Full URL
https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/login.php?email=[[-Email-]]
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.74.14.71 Melbourne, Australia, ASN45671 (AS45671-NET-AU Wholesale Services Provider, AU),
Reverse DNS
Software
Apache /
Resource Hash
fe59ef5353c07c0c92faf32cdada76d1774dacdf3fe83770eb21676089050b19

Request headers

Host
cor.royalaloha.ca
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
same-origin
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
document
Referer
https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=[[-Email-]]&.rand=13InboxLight.aspx?n=1774256418&fid=4
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=[[-Email-]]&.rand=13InboxLight.aspx?n=1774256418&fid=4

Response headers

Date
Tue, 09 Jun 2020 11:32:44 GMT
Server
Apache
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
logo.jpg
cor.royalaloha.ca/Dhl/dhl_topscript/source/content/photos/
4 KB
4 KB
Image
General
Full URL
https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/photos/logo.jpg
Requested by
Host: cor.royalaloha.ca
URL: https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/login.php?email=[[-Email-]]
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.74.14.71 Melbourne, Australia, ASN45671 (AS45671-NET-AU Wholesale Services Provider, AU),
Reverse DNS
Software
Apache /
Resource Hash
26933abb67839e269d8fc9d49b5ff722a1f48646776a8bdfb25e572d10996b41

Request headers

Referer
https://cor.royalaloha.ca/Dhl/dhl_topscript/source/content/login.php?email=[[-Email-]]
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 09 Jun 2020 11:32:45 GMT
Last-Modified
Thu, 16 Jan 2020 05:21:40 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
3902

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: DHL (Transportation)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies