Submitted URL: http://korishop.xyz//outlook/login/
Effective URL: http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
Submission Tags: phishing malicious Search All
Submission: On July 08 via api from JP

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 183.181.86.39, located in Osaka, Japan and belongs to VECTANT ARTERIA Networks Corporation, JP. The main domain is korishop.xyz.
This is the only time korishop.xyz was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 3 183.181.86.39 2519 (VECTANT A...)
2 2
Apex Domain
Subdomains
Transfer
3 korishop.xyz
korishop.xyz
83 KB
2 1
Domain Requested by
3 korishop.xyz 1 redirects korishop.xyz
2 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
Frame ID: C9202FB52EEFA56471D9A9B3BAE836F8
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://korishop.xyz//outlook/login/ HTTP 302
    http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

82 kB
Transfer

120 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://korishop.xyz//outlook/login/ HTTP 302
    http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Login.php
korishop.xyz//outlook/login/
Redirect Chain
  • http://korishop.xyz//outlook/login/
  • http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
43 KB
27 KB
Document
General
Full URL
http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
Protocol
HTTP/1.1
Server
183.181.86.39 Osaka, Japan, ASN2519 (VECTANT ARTERIA Networks Corporation, JP),
Reverse DNS
Software
nginx /
Resource Hash
3eb9b7d7b0bcd4a0b182edfa9498e82076f722a809083d1d4cb88ad79525b21c

Request headers

Host
korishop.xyz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=149af71bc63b6e254f0bdf89ace418a4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
nginx
Date
Wed, 08 Jul 2020 15:59:37 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Content-Encoding
gzip

Redirect headers

Server
nginx
Date
Wed, 08 Jul 2020 15:59:37 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=149af71bc63b6e254f0bdf89ace418a4; path=/
Location
Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

Referer
http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a

Request headers

Referer
http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a

Request headers

Referer
http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6

Request headers

Referer
http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
segoeui-regular.ttf
korishop.xyz//outlook/login/images/
55 KB
56 KB
Font
General
Full URL
http://korishop.xyz//outlook/login/images/segoeui-regular.ttf
Requested by
Host: korishop.xyz
URL: http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
Protocol
HTTP/1.1
Server
183.181.86.39 Osaka, Japan, ASN2519 (VECTANT ARTERIA Networks Corporation, JP),
Reverse DNS
Software
nginx /
Resource Hash
c147c2ec76a8ab8bd5082f1f4d3f80a43c689165cb164cdd812e44048fe38708

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
Origin
http://korishop.xyz

Response headers

Date
Wed, 08 Jul 2020 15:59:38 GMT
Last-Modified
Mon, 22 Jun 2020 17:35:16 GMT
Server
nginx
ETag
"ddb8-5a8afaa739d00"
Content-Type
application/font-sfnt
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
56760
truncated
/
7 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
257526b3e18469edef0487caa12d08b4ba2a9daffebc3ece45de636762471dbe

Request headers

Referer
http://korishop.xyz//outlook/login/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=83&id=7993812328
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| validateForm

0 Cookies