URL: http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
Submission Tags: @ipnigh
Submission: On February 22 via api from GB

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 4 HTTP transactions. The main IP is 212.50.29.4, located in Varna, Bulgaria and belongs to SPECTRUMNET, BG. The main domain is dgbrezichka.org.
This is the only time dgbrezichka.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
3 212.50.29.4 8717 (SPECTRUMNET)
1 217.70.184.50 29169 (GANDI-AS ...)
4 2
Apex Domain
Subdomains
Transfer
3 dgbrezichka.org
dgbrezichka.org
144 KB
1 none.com
none.com
4 2
Domain Requested by
3 dgbrezichka.org dgbrezichka.org
1 none.com dgbrezichka.org
4 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
Frame ID: 4E6C2BFEA7F5CE60B1D5184E65F181F4
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

144 kB
Transfer

150 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request verify55us.php
dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/
8 KB
1 KB
Document
General
Full URL
http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
Protocol
HTTP/1.1
Server
212.50.29.4 Varna, Bulgaria, ASN8717 (SPECTRUMNET, BG),
Reverse DNS
ns3.ro-ni.net
Software
Apache / PHP/7.0.33
Resource Hash
ce14870d0749b54c774191dacacdc35453072850810c61f568fb03cbcdab8ac9

Request headers

Host
dgbrezichka.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.116 Safari/537.36 Edg/80.0.361.50
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.116 Safari/537.36 Edg/80.0.361.50

Response headers

Date
Sat, 22 Feb 2020 11:37:22 GMT
Server
Apache
X-Powered-By
PHP/7.0.33
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
1174
Keep-Alive
timeout=15, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
3.png
dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/img/
141 KB
141 KB
Image
General
Full URL
http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/img/3.png
Requested by
Host: dgbrezichka.org
URL: http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
Protocol
HTTP/1.1
Server
212.50.29.4 Varna, Bulgaria, ASN8717 (SPECTRUMNET, BG),
Reverse DNS
ns3.ro-ni.net
Software
Apache /
Resource Hash
7b9d85a9790e1519f6576d36eb337181430307499e6e9be5d3bef087290cca05

Request headers

Referer
http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.116 Safari/537.36 Edg/80.0.361.50

Response headers

Date
Sat, 22 Feb 2020 11:37:22 GMT
Last-Modified
Fri, 17 Jan 2020 05:17:54 GMT
Server
Apache
ETag
"233b8-59c4f10566480"
Vary
Accept-Encoding
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=99
Content-Length
144312
4.png
dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/img/
1 KB
1 KB
Image
General
Full URL
http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/img/4.png
Requested by
Host: dgbrezichka.org
URL: http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
Protocol
HTTP/1.1
Server
212.50.29.4 Varna, Bulgaria, ASN8717 (SPECTRUMNET, BG),
Reverse DNS
ns3.ro-ni.net
Software
Apache /
Resource Hash
9471d71c87bbc38b417886a530a7397d7d10c7639e2fd055330178a81e8e4238

Request headers

Referer
http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.116 Safari/537.36 Edg/80.0.361.50

Response headers

Date
Sat, 22 Feb 2020 11:37:22 GMT
Last-Modified
Tue, 26 Sep 2017 14:07:00 GMT
Server
Apache
ETag
"4a1-55a183052c900"
Vary
Accept-Encoding
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=100
Content-Length
1185
/
none.com/
0
0
Image
General
Full URL
http://none.com/
Requested by
Host: dgbrezichka.org
URL: http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
Protocol
HTTP/1.1
Server
217.70.184.50 , France, ASN29169 (GANDI-AS Domain name registrar - http://www.gandi.net, FR),
Reverse DNS
webredir.vip.gandi.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://dgbrezichka.org/wabsnnnyrhjdsk/diuntdudru/nbbnhill/verify55us.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.116 Safari/537.36 Edg/80.0.361.50

Response headers

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| unhideBody

0 Cookies