kickassemails.com Open in urlscan Pro
192.254.232.164  Malicious Activity! Public Scan

Submitted URL: https://s.free.fr/3U6BtuRV
Effective URL: http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID...
Submission: On December 23 via manual from US

Summary

This website contacted 3 IPs in 3 countries across 4 domains to perform 14 HTTP transactions. The main IP is 192.254.232.164, located in Houston, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is kickassemails.com.
This is the only time kickassemails.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 2a01:e0c:1:15... 12322 (PROXAD)
1 47.21.197.250 6128 (CABLE-NET-1)
3 15 192.254.232.164 46606 (UNIFIEDLA...)
1 2a00:1450:400... 15169 (GOOGLE)
14 3
Apex Domain
Subdomains
Transfer
15 kickassemails.com
kickassemails.com
703 KB
1 googleapis.com
ajax.googleapis.com
33 KB
1 fraganciasoasis.org
fraganciasoasis.org
397 B
1 free.fr
s.free.fr
230 B
14 4
Domain Requested by
15 kickassemails.com 3 redirects kickassemails.com
ajax.googleapis.com
1 ajax.googleapis.com kickassemails.com
1 fraganciasoasis.org
1 s.free.fr 1 redirects
14 4

This site contains no links.

Subject Issuer Validity Valid
*.googleapis.com
Google Internet Authority G3
2018-12-04 -
2019-02-26
3 months crt.sh

This page contains 1 frames:

Primary Page: http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
Frame ID: 9E2F8D65A3F80982E85D903D57EC33F5
Requests: 14 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://s.free.fr/3U6BtuRV HTTP 301
    http://fraganciasoasis.org/pdf/smarturl.html?CID84 Page URL
  2. http://kickassemails.com/login/paypal/Login/ HTTP 302
    http://kickassemails.com/login/paypal/Login/newdir.php HTTP 302
    http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777 HTTP 301
    http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/ Page URL
  3. http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /CentOS/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Page Statistics

14
Requests

7 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

3
IPs

3
Countries

736 kB
Transfer

915 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://s.free.fr/3U6BtuRV HTTP 301
    http://fraganciasoasis.org/pdf/smarturl.html?CID84 Page URL
  2. http://kickassemails.com/login/paypal/Login/ HTTP 302
    http://kickassemails.com/login/paypal/Login/newdir.php HTTP 302
    http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777 HTTP 301
    http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/ Page URL
  3. http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://s.free.fr/3U6BtuRV HTTP 301
  • http://fraganciasoasis.org/pdf/smarturl.html?CID84
Request Chain 1
  • http://kickassemails.com/login/paypal/Login/ HTTP 302
  • http://kickassemails.com/login/paypal/Login/newdir.php HTTP 302
  • http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777 HTTP 301
  • http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/

14 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
smarturl.html
fraganciasoasis.org/pdf/
Redirect Chain
  • https://s.free.fr/3U6BtuRV
  • http://fraganciasoasis.org/pdf/smarturl.html?CID84
91 B
397 B
Document
General
Full URL
http://fraganciasoasis.org/pdf/smarturl.html?CID84
Protocol
HTTP/1.1
Server
47.21.197.250 , United States, ASN6128 (CABLE-NET-1 - Cablevision Systems Corp., US),
Reverse DNS
suranetworksolution.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
fraganciasoasis.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 23 Dec 2018 16:42:10 GMT
Server
Apache/2.2.15 (CentOS)
Last-Modified
Sun, 23 Dec 2018 15:56:35 GMT
ETag
"220c9d-5b-57db2865632c0"
Accept-Ranges
bytes
Content-Length
91
Keep-Alive
timeout=15, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

Server
nginx/1.6.2
Date
Sun, 23 Dec 2018 16:42:10 GMT
Content-Type
application/json
Content-Length
76
Connection
keep-alive
Location
http://fraganciasoasis.org/pdf/smarturl.html?CID84
/
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/
Redirect Chain
  • http://kickassemails.com/login/paypal/Login/
  • http://kickassemails.com/login/paypal/Login/newdir.php
  • http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777
  • http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/
455 B
772 B
Document
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
a3d62a2cbf26ad43b55d119ea30ee66a8001262ec1ff6d2896344fe7b03d142c

Request headers

Host
kickassemails.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://fraganciasoasis.org/pdf/smarturl.html?CID84
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
http://fraganciasoasis.org/pdf/smarturl.html?CID84

Response headers

Server
nginx/1.14.1
Date
Sun, 23 Dec 2018 16:42:13 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Encoding
gzip

Redirect headers

Server
nginx/1.14.1
Date
Sun, 23 Dec 2018 16:42:12 GMT
Content-Type
text/html; charset=iso-8859-1
Content-Length
352
Connection
keep-alive
Location
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/
Primary Request Up-dating.php
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/
5 KB
3 KB
Document
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
9517beb2ad5b0ee44beb3aeb767234bc276269539eee0cca81fabad676a91766

Request headers

Host
kickassemails.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/

Response headers

Server
nginx/1.14.1
Date
Sun, 23 Dec 2018 16:42:13 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Encoding
gzip
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.12.4/
95 KB
33 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Requested by
Host: kickassemails.com
URL: http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 21:45:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
241008
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
33951
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 20 Dec 2019 21:45:25 GMT
jquery.maskedinput.min.js
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
4 KB
2 KB
Script
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/jquery.maskedinput.min.js
Requested by
Host: kickassemails.com
URL: http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
cb19dda43377df2f93b78bdd04823ddb6a939d9808e39100f96865a89aa04230

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Content-Encoding
gzip
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
application/javascript
appSuperBowl.css
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
146 KB
30 KB
Stylesheet
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Requested by
Host: kickassemails.com
URL: http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
6247b6a4adbefb7ccfbea592140bcda2651689db5427726d841a637814460865

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/Up-dating.php?country.x=DE-Germany&ACCT.x=ID-PPL=PA32483.97.23.53=ScrPg=d6a34244326eb41905fad162933ddabd75154815f1bf3f7fd1244bfdc2a06fcfS=$1$.FIYt4QQ$mEQn82PXfJK2a7mppQht7.Rbl8fNnrL7zQMOxIZiKJyd6pXt2qusUCHFhjVo5WAcw3vETa4e9Yg1Bk0mSPGDSDWAvMnKJOZefxXYm7tRhPlV3b6BLHusQNzCkj81cE54qdiUga9yIr0w2TGopF71613481230
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Content-Encoding
gzip
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
text/css
bck.jpeg
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
417 KB
417 KB
Image
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/bck.jpeg
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
cf866b683a6a5c63bdd238c7d46bfc442805e52344de7027e144ff57b55595dd

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
426667
Content-Type
image/jpeg
lg.svg
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
5 KB
5 KB
Image
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/lg.svg
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
e35c57fad02017983d4261c8d65697ec8b312a2a19127cb93f92d1eca6408015

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5189
Content-Type
image/svg+xml
scs.png
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
28 KB
29 KB
Image
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/scs.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
6cfdeac3ea88a45d99b7336b28d5b4554654c042377950e80a4129847c3e548a

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
28966
Content-Type
image/png
psr.woff
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
46 KB
46 KB
Font
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/psr.woff
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
ae79dcc3eb016922caa1d095cfd936446bc65a46bb3364b242dfc556f7e3c6a8

Request headers

Pragma
no-cache
Origin
http://kickassemails.com
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Origin
http://kickassemails.com

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
47339
Content-Type
application/x-font-woff
lgerr.png
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
7 KB
7 KB
Image
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/lgerr.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
ec8b6a9543b7a8ade619dfa1e7b3e143a7394b8722aa36571b85f04a88869ad9

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
7399
Content-Type
image/png
scf.png
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
68 KB
68 KB
Image
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/scf.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
94ffc263295036858354cea9af2d7f0e45e1a030e781edd1655727c4b0eb226c

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
69730
Content-Type
image/png
psl.woff
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
46 KB
46 KB
Font
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/psl.woff
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
843e67ad522a908162007f4b7601819a5bbfef00e38ac7aec778766da8b7b2ab

Request headers

Pragma
no-cache
Origin
http://kickassemails.com
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Origin
http://kickassemails.com

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
46703
Content-Type
application/x-font-woff
pslm.woff
kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/
47 KB
48 KB
Font
General
Full URL
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/pslm.woff
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Protocol
HTTP/1.1
Server
192.254.232.164 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
1fc978067430d2bf5d50d4adebd57ec8cb847f63cb8925fddb76fb5825071e85

Request headers

Pragma
no-cache
Origin
http://kickassemails.com
Accept-Encoding
gzip, deflate
Host
kickassemails.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Cookie
PHPSESSID=5ea9ace84a9eb11cde9c6fd6b65f1b20
Connection
keep-alive
Cache-Control
no-cache
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
http://kickassemails.com/login/paypal/Login/944acd188e2af6a9a45d018f80f60777/imcs_files/appSuperBowl.css
Origin
http://kickassemails.com

Response headers

Date
Sun, 23 Dec 2018 16:42:14 GMT
Last-Modified
Sun, 23 Dec 2018 16:42:12 GMT
Server
nginx/1.14.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
48487
Content-Type
application/x-font-woff

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| displayDate

1 Cookies

Domain/Path Name / Value
kickassemails.com/ Name: PHPSESSID
Value: 5ea9ace84a9eb11cde9c6fd6b65f1b20