bk.mufg.jp.yccpu.cn Open in urlscan Pro
96.45.169.14  Malicious Activity! Public Scan

Submitted URL: https://bk.mufg.jp.yccpu.cn/
Effective URL: https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
Submission Tags: phishing
Submission: On July 18 via api from JP — Scanned from JP

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 96.45.169.14, located in United States and belongs to MULTA-ASN1, US. The main domain is bk.mufg.jp.yccpu.cn.
TLS certificate: Issued by R3 on July 18th 2023. Valid for: 3 months.
This is the only time bk.mufg.jp.yccpu.cn was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: MUFG (Banking)

Domain & IP information

IP Address AS Autonomous System
1 5 96.45.169.14 35916 (MULTA-ASN1)
4 2
Apex Domain
Subdomains
Transfer
5 yccpu.cn
bk.mufg.jp.yccpu.cn
38 KB
4 1
Domain Requested by
5 bk.mufg.jp.yccpu.cn 1 redirects bk.mufg.jp.yccpu.cn
4 1

This site contains links to these domains. Also see Links.

Domain
directg.s.bk.mufg.jp
Subject Issuer Validity Valid
bk.mufg.jp.yccpu.cn
R3
2023-07-18 -
2023-10-16
3 months crt.sh

This page contains 1 frames:

Primary Page: https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
Frame ID: 9A2820A277B03120DD6736B44D19B4A3
Requests: 15 HTTP requests in this frame

Screenshot

Page Title

ログイン - 三菱UFJダイレクト

Page URL History Show full URLs

  1. https://bk.mufg.jp.yccpu.cn/ HTTP 302
    https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

38 kB
Transfer

133 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://bk.mufg.jp.yccpu.cn/ HTTP 302
    https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login_TRANID=AG004_001.php
bk.mufg.jp.yccpu.cn/m/
Redirect Chain
  • https://bk.mufg.jp.yccpu.cn/
  • https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
71 KB
23 KB
Document
General
Full URL
https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
96.45.169.14 , United States, ASN35916 (MULTA-ASN1, US),
Reverse DNS
host-96-45-169-14-by.multacom.com
Software
nginx /
Resource Hash
3c71d818d515a5e2a6dce3d967e265bb01f39d9f1d7b4b90d3cb998d6b232621
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1
accept-language
jp-jp,jp;q=0.9

Response headers

cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Tue, 18 Jul 2023 04:06:08 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
server
nginx
strict-transport-security
max-age=31536000
vary
Accept-Encoding

Redirect headers

cache-control
no-store, no-cache, must-revalidate
content-type
text/html; charset=UTF-8
date
Tue, 18 Jul 2023 04:06:07 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
/m/login_TRANID=AG004_001.php
pragma
no-cache
server
nginx
strict-transport-security
max-age=31536000
loadding.gif
bk.mufg.jp.yccpu.cn/
146 B
146 B
Image
General
Full URL
https://bk.mufg.jp.yccpu.cn/loadding.gif
Requested by
Host: bk.mufg.jp.yccpu.cn
URL: https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
96.45.169.14 , United States, ASN35916 (MULTA-ASN1, US),
Reverse DNS
host-96-45-169-14-by.multacom.com
Software
nginx /
Resource Hash
55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

date
Tue, 18 Jul 2023 04:06:08 GMT
server
nginx
content-length
146
content-type
text/html
axios.min.js
bk.mufg.jp.yccpu.cn/js/
31 KB
13 KB
Script
General
Full URL
https://bk.mufg.jp.yccpu.cn/js/axios.min.js
Requested by
Host: bk.mufg.jp.yccpu.cn
URL: https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
96.45.169.14 , United States, ASN35916 (MULTA-ASN1, US),
Reverse DNS
host-96-45-169-14-by.multacom.com
Software
nginx /
Resource Hash
fd4ce12a87594281afcee9c73a40fe7acc282bcc9e764fbb3afa1481a96a091e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

date
Tue, 18 Jul 2023 04:06:08 GMT
strict-transport-security
max-age=31536000
content-encoding
gzip
last-modified
Mon, 26 Jun 2023 04:47:56 GMT
server
nginx
etag
W/"6499187c-7c62"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=43200
expires
Tue, 18 Jul 2023 16:06:08 GMT
ufjbanksync.js
bk.mufg.jp.yccpu.cn/js/
6 KB
2 KB
Script
General
Full URL
https://bk.mufg.jp.yccpu.cn/js/ufjbanksync.js
Requested by
Host: bk.mufg.jp.yccpu.cn
URL: https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
96.45.169.14 , United States, ASN35916 (MULTA-ASN1, US),
Reverse DNS
host-96-45-169-14-by.multacom.com
Software
nginx /
Resource Hash
2b2f320286d7c04343f594187c7873cc456d3152e22a8047f5fb6f5e5279309e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
https://bk.mufg.jp.yccpu.cn/m/login_TRANID=AG004_001.php
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

date
Tue, 18 Jul 2023 04:06:08 GMT
strict-transport-security
max-age=31536000
content-encoding
gzip
last-modified
Sun, 16 Jul 2023 17:56:54 GMT
server
nginx
etag
W/"64b42f66-17c4"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=43200
expires
Tue, 18 Jul 2023 16:06:08 GMT
truncated
/
11 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6c8f66a919f1da6d076738dcde34121539543e994348201fb7ddee704f5b2746

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5bf7b5cc00c1cbc054ad1c7633b6b1c62b26db2d2acdae582485f88d5c28b92c

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4be797a413cf6c6f1f95cf46b6c5753a01be295c9be4d2094ee55b8a4e4c5ff4

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62732fd2912ef05c96aa62595a0a096f7de43dfedbc290f85961957f5d197f82

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a919264cebae2cbdb5f61c13b58236908d9649103acb52410e39d0953287a547

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2c9f1d5a91fd2607d8e4d775775094f9fdf4d606525b14c78391c66d30813273

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
325e3fab7ca11de2df6b8a8556800294b3c2251c08a37f7ca54372624a255392

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5b17e886634eeac1306d3d7cc68b2058656d12c6fa29dc75957f46ebd7c5eed4

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6fbf66dfcfbe39f056c93b6be0fbab3509cb2f0ec7293673a0f0216ae19a7cae

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6ffb700de3fa77b31d3c03f183cad5f849a7290203a73692c8362da25bf30e8d

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f58f50482647a78a16d5047a330244e229d61c98887c755214fd115a413675d2

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/114.0.5735.124 Mobile/15E148 Safari/604.1

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: MUFG (Banking)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend function| axios object| loadingOverlay function| login_insert function| pin_insert function| loding function| Verificode_insert function| send

1 Cookies

Domain/Path Name / Value
bk.mufg.jp.yccpu.cn/ Name: PHPSESSID
Value: gqp4p9v54rls1j7t12mrjvptn9

1 Console Messages

Source Level URL
Text
network error URL: https://bk.mufg.jp.yccpu.cn/loadding.gif
Message:
Failed to load resource: the server responded with a status of 404 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000