covidapply-pass.digital Open in urlscan Pro
141.136.39.11  Malicious Activity! Public Scan

Submitted URL: http://covidapply-pass.digital/
Effective URL: http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Submission Tags: https://phish.report @phish_report Search All
Submission: On October 26 via api from FI — Scanned from DE

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 7 HTTP transactions. The main IP is 141.136.39.11, located in Lithuania and belongs to AS-HOSTINGER, CY. The main domain is covidapply-pass.digital.
This is the only time covidapply-pass.digital was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: NHS UK (Healthcare)

Domain & IP information

IP Address AS Autonomous System
1 5 141.136.39.11 47583 (AS-HOSTINGER)
1 69.16.175.42 20446 (HIGHWINDS3)
2 88.221.60.244 16625 (AKAMAI-AS)
7 3
Apex Domain
Subdomains
Transfer
5 covidapply-pass.digital
covidapply-pass.digital
19 KB
2 assets.nhs.uk
assets.nhs.uk
35 KB
1 jquery.com
code.jquery.com
30 KB
7 3
Domain Requested by
5 covidapply-pass.digital 1 redirects covidapply-pass.digital
2 assets.nhs.uk covidapply-pass.digital
1 code.jquery.com covidapply-pass.digital
7 3

This site contains no links.

Subject Issuer Validity Valid
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2021-07-14 -
2022-08-14
a year crt.sh
www.nhs.uk
DigiCert SHA2 Secure Server CA
2021-07-16 -
2022-08-07
a year crt.sh

This page contains 1 frames:

Primary Page: http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Frame ID: 14BEDF1216684F3E63DE594C41189774
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

What is your name? - Book a coronavirus vaccination - NHS

Page URL History Show full URLs

  1. http://covidapply-pass.digital/ HTTP 302
    http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

7
Requests

43 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

3
Countries

83 kB
Transfer

229 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://covidapply-pass.digital/ HTTP 302
    http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request step1.php
covidapply-pass.digital/
Redirect Chain
  • http://covidapply-pass.digital/
  • http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
13 KB
3 KB
Document
General
Full URL
http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Protocol
HTTP/1.1
Server
141.136.39.11 , Lithuania, ASN47583 (AS-HOSTINGER, CY),
Reverse DNS
cpl13.main-hosting.eu
Software
LiteSpeed / PHP/7.4.22
Resource Hash
94867ddc9932620b774c5e56e63b445893403ba082b1ec344111ccf0085576d8

Request headers

Host
covidapply-pass.digital
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=5e1d8f14a5f13d63ce4191412106ffa5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
x-powered-by
PHP/7.4.22
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
content-type
text/html; charset=UTF-8
content-length
2842
content-encoding
gzip
vary
Accept-Encoding
date
Tue, 26 Oct 2021 13:15:01 GMT
server
LiteSpeed

Redirect headers

Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
x-powered-by
PHP/7.4.22
set-cookie
PHPSESSID=5e1d8f14a5f13d63ce4191412106ffa5; path=/
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-cache, no-store, must-revalidate, max-age=0
pragma
no-cache
location
step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
content-type
text/html; charset=UTF-8
content-length
0
date
Tue, 26 Oct 2021 13:15:01 GMT
server
LiteSpeed
main.css
covidapply-pass.digital/css/
77 KB
11 KB
Stylesheet
General
Full URL
http://covidapply-pass.digital/css/main.css
Requested by
Host: covidapply-pass.digital
URL: http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Protocol
HTTP/1.1
Server
141.136.39.11 , Lithuania, ASN47583 (AS-HOSTINGER, CY),
Reverse DNS
cpl13.main-hosting.eu
Software
LiteSpeed /
Resource Hash
16df4867f34dfc9389823b16948a458d43970afcfc35f34a0622bfb543387d2a

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
covidapply-pass.digital
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Cookie
PHPSESSID=5e1d8f14a5f13d63ce4191412106ffa5
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Tue, 26 Oct 2021 13:15:01 GMT
content-encoding
gzip
last-modified
Wed, 30 Jun 2021 20:57:33 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=604800
Connection
Keep-Alive
accept-ranges
bytes
Keep-Alive
timeout=5, max=100
content-length
10569
expires
Tue, 02 Nov 2021 13:15:01 GMT
jquery-3.6.0.min.js
code.jquery.com/
87 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: covidapply-pass.digital
URL: http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
69.16.175.42 Phoenix, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
tlb.hwcdn.net
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://covidapply-pass.digital/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Tue, 26 Oct 2021 13:15:01 GMT
content-encoding
gzip
last-modified
Tue, 02 Mar 2021 17:27:20 GMT
server
nginx
etag
W/"603e7578-15d9d"
vary
Accept-Encoding
x-hw
1635254101.dop235.fr8.t,1635254101.cds290.fr8.hn,1635254101.cds144.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30875
jquery.redirect.js
covidapply-pass.digital/js/
6 KB
3 KB
Script
General
Full URL
http://covidapply-pass.digital/js/jquery.redirect.js
Requested by
Host: covidapply-pass.digital
URL: http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Protocol
HTTP/1.1
Server
141.136.39.11 , Lithuania, ASN47583 (AS-HOSTINGER, CY),
Reverse DNS
cpl13.main-hosting.eu
Software
LiteSpeed /
Resource Hash
6d69ae5c4892d35573385da52afebec92fb02feaf7670b0684c1b2aa6f2cfb98

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
covidapply-pass.digital
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
*/*
Referer
http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Cookie
PHPSESSID=5e1d8f14a5f13d63ce4191412106ffa5
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Tue, 26 Oct 2021 13:15:01 GMT
content-encoding
gzip
last-modified
Wed, 30 Jun 2021 20:57:33 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=604800
Connection
Keep-Alive
accept-ranges
bytes
Keep-Alive
timeout=5, max=100
content-length
2187
expires
Tue, 02 Nov 2021 13:15:01 GMT
functions.js
covidapply-pass.digital/js/
11 KB
2 KB
Script
General
Full URL
http://covidapply-pass.digital/js/functions.js?1.0.0
Requested by
Host: covidapply-pass.digital
URL: http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Protocol
HTTP/1.1
Server
141.136.39.11 , Lithuania, ASN47583 (AS-HOSTINGER, CY),
Reverse DNS
cpl13.main-hosting.eu
Software
LiteSpeed /
Resource Hash
973ef58ab4a82d11e857b80ccaa4400e5630374b6ac0598932b75b3e0f844f1e

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
covidapply-pass.digital
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
*/*
Referer
http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
Cookie
PHPSESSID=5e1d8f14a5f13d63ce4191412106ffa5
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://covidapply-pass.digital/step1.php?XKhaSRAHj&inID=zzxNwgMNmjpLEdEYzLKBvWKDdtdbqzlhpwiEbgKZe
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Tue, 26 Oct 2021 13:15:01 GMT
content-encoding
gzip
last-modified
Wed, 30 Jun 2021 20:57:33 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=604800
Connection
Keep-Alive
accept-ranges
bytes
Keep-Alive
timeout=5, max=100
content-length
1572
expires
Tue, 02 Nov 2021 13:15:01 GMT
FrutigerLTW01-55Roman.woff2
assets.nhs.uk/fonts/
17 KB
17 KB
Font
General
Full URL
https://assets.nhs.uk/fonts/FrutigerLTW01-55Roman.woff2
Requested by
Host: covidapply-pass.digital
URL: http://covidapply-pass.digital/css/main.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
88.221.60.244 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a88-221-60-244.deploy.static.akamaitechnologies.com
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
886f640d4cb31c0114351f25e5eeba98b79e7ae405fcc2ca50aac6ed79ff8995

Request headers

Referer
http://covidapply-pass.digital/
Origin
http://covidapply-pass.digital
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
date
Tue, 26 Oct 2021 13:15:01 GMT
last-modified
Tue, 09 Apr 2019 10:17:13 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
content-md5
lRIDEWIJgHewKikdW/afDg==
etag
0x8D6BCD488B0257A
content-type
application/octet-stream
access-control-allow-origin
*
x-ms-request-id
9b836279-901e-003a-7f08-1aebe6000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=2628288
x-ms-version
2009-09-19
content-length
17284
expires
Thu, 25 Nov 2021 23:19:49 GMT
FrutigerLTW01-65Bold.woff2
assets.nhs.uk/fonts/
17 KB
17 KB
Font
General
Full URL
https://assets.nhs.uk/fonts/FrutigerLTW01-65Bold.woff2
Requested by
Host: covidapply-pass.digital
URL: http://covidapply-pass.digital/css/main.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
88.221.60.244 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a88-221-60-244.deploy.static.akamaitechnologies.com
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
d7a61b8131c25f4f7949162fcf342c8ba52b0257756aaacf23aa948f0403c842

Request headers

Referer
http://covidapply-pass.digital/
Origin
http://covidapply-pass.digital
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
date
Tue, 26 Oct 2021 13:15:01 GMT
last-modified
Tue, 09 Apr 2019 10:17:14 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
content-md5
OPdl6/MQFVFaVJuAqOKjeg==
etag
0x8D6BCD48962A5B8
content-type
application/octet-stream
access-control-allow-origin
*
x-ms-request-id
f4c85fc0-801e-0048-01cf-3e9ad8000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=2628288
x-ms-version
2009-09-19
content-length
17216
expires
Thu, 25 Nov 2021 23:19:49 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: NHS UK (Healthcare)

8 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster function| $ function| jQuery function| valid_credit_card function| clear_field function| submit function| expiry_format

1 Cookies

Domain/Path Name / Value
covidapply-pass.digital/ Name: PHPSESSID
Value: 5e1d8f14a5f13d63ce4191412106ffa5