URL: http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.125289964...
Submission: On September 17 via automatic, source openphish — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 3 HTTP transactions. The main IP is 69.73.185.25, located in United States and belongs to NTHL, US. The main domain is theuberapps.com.
This is the only time theuberapps.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
2 69.73.185.25 11042 (NTHL)
1 2 2a06:98c1:312... 13335 (CLOUDFLAR...)
3 2
Apex Domain
Subdomains
Transfer
2 petstop.com.sg
petstop.com.sg
1 KB
2 theuberapps.com
theuberapps.com
33 KB
3 2
Domain Requested by
2 petstop.com.sg 1 redirects theuberapps.com
2 theuberapps.com theuberapps.com
3 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email=ZW1haWxAcG9zdGVpdGFsaWFuZS5pdA==&.rand=13InboxLight.aspx?n=1774256418
Frame ID: 5D968F605F9E5C959F2AF06DC8EF46E1
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Mail Verification

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • \.aspx?(?:$|\?)

Page Statistics

3
Requests

0 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

33 kB
Transfer

33 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://petstop.com.sg/google_analytics_auto.js HTTP 301
  • https://petstop.com.sg/google_analytics_auto.js

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request boxMrenewal.php
theuberapps.com/zman/oluwabillion/oluwanishola/
2 KB
2 KB
Document
General
Full URL
http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email=ZW1haWxAcG9zdGVpdGFsaWFuZS5pdA==&.rand=13InboxLight.aspx?n=1774256418
Protocol
HTTP/1.1
Server
69.73.185.25 , United States, ASN11042 (NTHL, US),
Reverse DNS
vps.demskigroup.com
Software
Apache /
Resource Hash
e0a74aec1a616ddc8ff5141c666da3ae23e7abdcab3bab4b3adcc3455a8eaf0d

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Sat, 17 Sep 2022 02:08:49 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Transfer-Encoding
chunked
google_analytics_auto.js
petstop.com.sg/
Redirect Chain
  • http://petstop.com.sg/google_analytics_auto.js
  • https://petstop.com.sg/google_analytics_auto.js
0
0
Script
General
Full URL
https://petstop.com.sg/google_analytics_auto.js
Requested by
Host: theuberapps.com
URL: http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email=ZW1haWxAcG9zdGVpdGFsaWFuZS5pdA==&.rand=13InboxLight.aspx?n=1774256418
Protocol
H2
Server
2a06:98c1:3120::c , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
/
Resource Hash

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://theuberapps.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

Redirect headers

Date
Sat, 17 Sep 2022 02:08:50 GMT
X-Content-Type-Options
nosniff
CF-Cache-Status
EXPIRED
NEL
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
X-XSS-Protection
1
Referrer-Policy
origin-when-cross-origin
Server
cloudflare
X-Frame-Options
sameorigin
Strict-Transport-Security
max-age=604800
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=1U1Fsovi%2Bucb%2FEH0ed0EV6YAC7rC%2B8JHmBr6zTMag%2F1wH1WSJg4MWJmiFpq5p4cjRh%2BBbtt%2BaF3jPSljwlXXTHkHm%2FoicB44%2Fv22Y%2F84KLOVXjzTaZI06LA1OPK6ErMplX5ALgWCLr1ppzg%2B6A%3D%3D"}],"group":"cf-nel","max_age":604800}
Content-Type
text/html; charset=UTF-8
Location
https://petstop.com.sg/google_analytics_auto.js
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
Cache-Control
max-age=14400, must-revalidate
Permissions-Policy
accelerometer=(self), autoplay=(self), camera=(self), encrypted-media=(self), fullscreen=(self), geolocation=(self), gyroscope=(self), magnetometer=(self), microphone=(self), midi=(self), payment=(self), usb=(self)
CF-RAY
74be4bd94dec92b9-FRA
Expires
Wed, 11 Jan 1984 05:00:00 GMT
logo.png
theuberapps.com/zman/oluwabillion/oluwanishola/files/
31 KB
31 KB
Image
General
Full URL
http://theuberapps.com/zman/oluwabillion/oluwanishola/files/logo.png
Requested by
Host: theuberapps.com
URL: http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email=ZW1haWxAcG9zdGVpdGFsaWFuZS5pdA==&.rand=13InboxLight.aspx?n=1774256418
Protocol
HTTP/1.1
Server
69.73.185.25 , United States, ASN11042 (NTHL, US),
Reverse DNS
vps.demskigroup.com
Software
Apache /
Resource Hash
449f6a97abfc261ff32809775f3d6ff03624594ccf1e80a6238a44f43fadd027

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email=ZW1haWxAcG9zdGVpdGFsaWFuZS5pdA==&.rand=13InboxLight.aspx?n=1774256418
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

Date
Sat, 17 Sep 2022 02:08:50 GMT
Last-Modified
Wed, 16 Mar 2022 23:00:16 GMT
Server
Apache
ETag
"196842-7bf7-5da5de0730000"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
31735

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://petstop.com.sg/google_analytics_auto.js
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

petstop.com.sg
theuberapps.com
2a06:98c1:3120::c
69.73.185.25
449f6a97abfc261ff32809775f3d6ff03624594ccf1e80a6238a44f43fadd027
e0a74aec1a616ddc8ff5141c666da3ae23e7abdcab3bab4b3adcc3455a8eaf0d