a2plvcpnl277180.prod.iad2.secureserver.net Open in urlscan Pro
148.72.105.196  Malicious Activity! Public Scan

Submitted URL: https://p3plvcpnl324474.prod.phx3.secureserver.net/~q0otnya15spa/happyfacesusa.org/reassign.php?email=fake@fake123.com
Effective URL: https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLi...
Submission: On May 22 via manual from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 148.72.105.196, located in Scottsdale, United States and belongs to AS-26496-GO-DADDY-COM-LLC, US. The main domain is a2plvcpnl277180.prod.iad2.secureserver.net.
TLS certificate: Issued by Starfield Secure Certificate Authorit... on January 14th 2020. Valid for: 2 years.
This is the only time a2plvcpnl277180.prod.iad2.secureserver.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 208.109.166.177 26496 (AS-26496-...)
1 3 148.72.105.196 26496 (AS-26496-...)
3 2
Domain Requested by
3 a2plvcpnl277180.prod.iad2.secureserver.net 1 redirects p3plvcpnl324474.prod.phx3.secureserver.net
a2plvcpnl277180.prod.iad2.secureserver.net
1 p3plvcpnl324474.prod.phx3.secureserver.net
3 2

This site contains no links.

Subject Issuer Validity Valid
*.prod.phx3.secureserver.net
Starfield Secure Certificate Authority - G2
2020-01-14 -
2022-01-14
2 years crt.sh
*.prod.iad2.secureserver.net
Starfield Secure Certificate Authority - G2
2020-01-14 -
2022-01-14
2 years crt.sh

This page contains 1 frames:

Primary Page: https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake123.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: B77FEA30FDE830F7152B717D39EC2AC1
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://p3plvcpnl324474.prod.phx3.secureserver.net/~q0otnya15spa/happyfacesusa.org/reassign.php?email=fake@fake123.com Page URL
  2. https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/indel.php?email=fake@fa... HTTP 302
    https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrb... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

2
Subdomains

2
IPs

1
Countries

24 kB
Transfer

25 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://p3plvcpnl324474.prod.phx3.secureserver.net/~q0otnya15spa/happyfacesusa.org/reassign.php?email=fake@fake123.com Page URL
  2. https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/indel.php?email=fake@fake123.com HTTP 302
    https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake123.com&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
reassign.php
p3plvcpnl324474.prod.phx3.secureserver.net/~q0otnya15spa/happyfacesusa.org/
196 B
295 B
Document
General
Full URL
https://p3plvcpnl324474.prod.phx3.secureserver.net/~q0otnya15spa/happyfacesusa.org/reassign.php?email=fake@fake123.com
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
208.109.166.177 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-208-109-166-177.ip.secureserver.net
Software
Apache / PHP/7.3.8
Resource Hash
622eb3a4de9d34b29fb56f25c8760f61664d46026a34ab764ca906394bbad5a5

Request headers

:method
GET
:authority
p3plvcpnl324474.prod.phx3.secureserver.net
:scheme
https
:path
/~q0otnya15spa/happyfacesusa.org/reassign.php?email=fake@fake123.com
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Fri, 22 May 2020 11:01:18 GMT
server
Apache
x-powered-by
PHP/7.3.8
vary
Accept-Encoding,User-Agent
content-encoding
gzip
content-length
171
content-type
text/html; charset=UTF-8
Primary Request nr8rm8jms13gzfl5vp3ebrbh.php
a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/
Redirect Chain
  • https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/indel.php?email=fake@fake123.com
  • https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&r...
1 KB
664 B
Document
General
Full URL
https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake123.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Requested by
Host: p3plvcpnl324474.prod.phx3.secureserver.net
URL: https://p3plvcpnl324474.prod.phx3.secureserver.net/~q0otnya15spa/happyfacesusa.org/reassign.php?email=fake@fake123.com
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
148.72.105.196 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-148-72-105-196.ip.secureserver.net
Software
Apache / PHP/7.3.14
Resource Hash
9dbb0f444ce139621d99c73bab49fae15fdc95d679539fcd237525d7ea5b4317

Request headers

:method
GET
:authority
a2plvcpnl277180.prod.iad2.secureserver.net
:scheme
https
:path
/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake123.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
same-site
sec-fetch-mode
navigate
sec-fetch-dest
document
referer
https://p3plvcpnl324474.prod.phx3.secureserver.net/~q0otnya15spa/happyfacesusa.org/reassign.php?email=fake@fake123.com
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
PHPSESSID=0ee085d84100bec17c8fd80a3e4701e7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://p3plvcpnl324474.prod.phx3.secureserver.net/~q0otnya15spa/happyfacesusa.org/reassign.php?email=fake@fake123.com

Response headers

status
200
date
Fri, 22 May 2020 11:01:19 GMT
server
Apache
x-powered-by
PHP/7.3.14
vary
Accept-Encoding,User-Agent
content-encoding
gzip
content-length
609
content-type
text/html; charset=UTF-8

Redirect headers

status
302
date
Fri, 22 May 2020 11:01:19 GMT
server
Apache
x-powered-by
PHP/7.3.14
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
set-cookie
PHPSESSID=0ee085d84100bec17c8fd80a3e4701e7; path=/
location
nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake123.com&.rand=13InboxLight.aspx?n=1774256418&fid=4#n=1252899642&fid=1&fav=1
vary
User-Agent
content-length
0
content-type
text/html; charset=UTF-8
logo.png
a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/
23 KB
23 KB
Image
General
Full URL
https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/logo.png
Requested by
Host: a2plvcpnl277180.prod.iad2.secureserver.net
URL: https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake123.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
148.72.105.196 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-148-72-105-196.ip.secureserver.net
Software
Apache /
Resource Hash
c8766f319626d068121e927de7cde8e221e85842e286098e0a11ab3f54c020a1

Request headers

Referer
https://a2plvcpnl277180.prod.iad2.secureserver.net/~uczns17yrwu0/moorestowncenter.com/css/windowsupdate/nr8rm8jms13gzfl5vp3ebrbh.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake123.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 22 May 2020 11:01:20 GMT
last-modified
Mon, 09 Nov 2015 00:24:22 GMT
server
Apache
etag
"7a11a7-5c22-524109d60d980"
content-type
image/png
status
200
accept-ranges
bytes
content-length
23586

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

1 Cookies

Domain/Path Name / Value
a2plvcpnl277180.prod.iad2.secureserver.net/ Name: PHPSESSID
Value: 0ee085d84100bec17c8fd80a3e4701e7