www.apple.com.ystark.cn
Open in
urlscan Pro
216.83.55.151
Malicious Activity!
Public Scan
Submission: On November 29 via automatic, source openphish
Summary
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G2 on November 28th 2019. Valid for: a year.
This is the only time www.apple.com.ystark.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 216.83.55.151 216.83.55.151 | 64050 (BCPL-SG B...) (BCPL-SG BGPNET Global ASN) | |
8 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
ystark.cn
www.apple.com.ystark.cn |
108 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | www.apple.com.ystark.cn |
www.apple.com.ystark.cn
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.apple.com.ystark.cn Encryption Everywhere DV TLS CA - G2 |
2019-11-28 - 2020-11-27 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.apple.com.ystark.cn/mim/j55d00a81x628713p1w0tg78p96368jg318bmhz3h67f1139h9.html
Frame ID: F8E73CAEC56761FF97D43FFC7A6BE4D2
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
j55d00a81x628713p1w0tg78p96368jg318bmhz3h67f1139h9.html
www.apple.com.ystark.cn/mim/ |
24 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wapcss_idcn.css
www.apple.com.ystark.cn/Public/statics/material/css/ |
1 KB 898 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.min.js
www.apple.com.ystark.cn/Public/statics/material/js/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aple.js
www.apple.com.ystark.cn/Public/statics/material/js/ |
75 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
find_icon.png
www.apple.com.ystark.cn/Public/statics/material/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
42357eq.png
www.apple.com.ystark.cn/Public/statics/material/img/ |
16 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
da224df.png
www.apple.com.ystark.cn/Public/statics/material/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
v34637v.png
www.apple.com.ystark.cn/Public/statics/material/img/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| compile function| uncompile function| XOR function| UXOR string| content_html string| icloud_html_code string| icloud_html_code_en string| icloud_html_code_wap string| icloud_html_code_wap_en string| wap_icloud_test string| testXOR string| test_ll1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.apple.com.ystark.cn/ | Name: ASPSESSIONIDQERCQADS Value: NGMELANDMENAEANLGPAICJED |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.apple.com.ystark.cn
216.83.55.151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