mizukobamk.jrjrbxs.com
Open in
urlscan Pro
23.247.42.12
Malicious Activity!
Public Scan
Submission Tags: tweet @quicksandphish #phishing Search All
Submission: On December 27 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by R3 on December 26th 2022. Valid for: 3 months.
This is the only time mizukobamk.jrjrbxs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Mizuho Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 23.247.42.12 23.247.42.12 | 46573 (LAYER-HOST) (LAYER-HOST) | |
14 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
jrjrbxs.com
mizukobamk.jrjrbxs.com |
251 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | mizukobamk.jrjrbxs.com |
mizukobamk.jrjrbxs.com
|
14 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.mizuhobank.co.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
mizukobamk.jrjrbxs.com R3 |
2022-12-26 - 2023-03-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mizukobamk.jrjrbxs.com/miziha/client/login.html
Frame ID: ABBF0A95FE63A2852B43FE9CC966C6AD
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
みずほダイレクトDetected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- (?:/([\d.]+))?/vue(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: みずほ銀行トップ
Search URL Search Domain Scan URL
Title: みずほダイレクトトップ
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.html
mizukobamk.jrjrbxs.com/miziha/client/ |
12 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
reset.css
mizukobamk.jrjrbxs.com/miziha/css/ |
995 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
com.css
mizukobamk.jrjrbxs.com/miziha/css/ |
36 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
n00000.css
mizukobamk.jrjrbxs.com/miziha/css/ |
1 KB 608 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mizuho_direct.gif
mizukobamk.jrjrbxs.com/miziha/img/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loginBanner.gif
mizukobamk.jrjrbxs.com/miziha/img/ |
7 KB 7 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mdirect_helpdesk.gif
mizukobamk.jrjrbxs.com/miziha/img/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
md_helpdesk_tel.gif
mizukobamk.jrjrbxs.com/miziha/img/ |
14 KB 14 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue.js
mizukobamk.jrjrbxs.com/miziha/js/ |
334 KB 104 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.js
mizukobamk.jrjrbxs.com/miziha/js/ |
281 KB 97 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.js
mizukobamk.jrjrbxs.com/miziha/js/ |
1 KB 897 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
brandingband960.gif
mizukobamk.jrjrbxs.com/miziha/img/ |
8 KB 8 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow02.gif
mizukobamk.jrjrbxs.com/miziha/img/ |
147 B 352 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
info.gif
mizukobamk.jrjrbxs.com/miziha/img/ |
548 B 548 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Mizuho Bank (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| Vue function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mizukobamk.jrjrbxs.com
23.247.42.12
352baa818da109925437a8433057ddc6f91ec48efe88bc5741b2f9e34450fdce
416a3b2c3bf16d64f6b5b6d0f7b079df2267614dd6847fc2f3271b4409233c37
64a1332359d489683ad48c0389e5151748d753aba76de391d3ee142d38749e67
682a00b07b60a538cda48b7063e2034668497ac8b85c511cff50055394815803
6dfd3b6fa480f22589119e3081cf8ee327419d0d7521f2532182f5ade63e663e
73d95695ee6358f34c55a5e0d2c79bcb97b00d2cdc7d48d721b7d95a03a84da7
76ca7fcb0733c498dea23e592e7bed8436822fa8fd677f0aad1cb6d3d7b99978
870afca91ee04a75e362f034970c5165056ed74becf70392168c7b6e104c71c3
9d67efdc2a9c82d9ff1613cf1c5988c8d02b495b66e5483b94b0b0bc4b712ed1
a095e6e4643b8309120084e1df57425912c57ee6a3ab8740b6af4d184ce4731e
a492961678836c31f4a5270183dbf5e9412707f62f5d1e53e2a7c6fbdedd0239
a55049800b582e17e6b9dee507cb0ea207dde36bb9844dae32ca0ffafb33bc1c
b9104494da55bb7d65ef8ea32f045e70ff30e9557fb2859a298f488782102544
d465172175d35d493fb1633e237700022bd849fa123164790b168b8318acb090