URL: http://cookchapter.com/mail/folder/file/inbox/KoreaAuto/kr/o.php
Submission: On July 21 via manual from KR

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 3 HTTP transactions. The main IP is 146.185.239.78, located in Russian Federation and belongs to GOOD, LV. The main domain is cookchapter.com.
This is the only time cookchapter.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
2 146.185.239.78 212496 (GOOD)
1 192.0.72.22 2635 (AUTOMATTIC)
3 2
Apex Domain
Subdomains
Transfer
2 cookchapter.com
cookchapter.com
3 KB
1 wordpress.com
yahnwagner.files.wordpress.com
95 KB
3 2
Domain Requested by
2 cookchapter.com cookchapter.com
1 yahnwagner.files.wordpress.com cookchapter.com
3 2

This site contains no links.

Subject Issuer Validity Valid
*.files.wordpress.com
Sectigo RSA Domain Validation Secure Server CA
2020-12-21 -
2022-01-21
a year crt.sh

This page contains 1 frames:

Primary Page: http://cookchapter.com/mail/folder/file/inbox/KoreaAuto/kr/o.php
Frame ID: 06E9019D6874C4CB31ABB3BECB4A201F
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

33 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

97 kB
Transfer

97 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request o.php
cookchapter.com/mail/folder/file/inbox/KoreaAuto/kr/
2 KB
2 KB
Document
General
Full URL
http://cookchapter.com/mail/folder/file/inbox/KoreaAuto/kr/o.php
Protocol
HTTP/1.1
Server
146.185.239.78 , Russian Federation, ASN212496 (GOOD, LV),
Reverse DNS
bronof.rn.example.com
Software
Apache /
Resource Hash
c0826db244bb96af36d32bb5bc7e3e6f5601deab51b44a4007a19c7a109af5c7

Request headers

Host
cookchapter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 21 Jul 2021 06:42:18 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
google_analytics_auto.js
cookchapter.com/
406 B
613 B
Script
General
Full URL
http://cookchapter.com/google_analytics_auto.js
Requested by
Host: cookchapter.com
URL: http://cookchapter.com/mail/folder/file/inbox/KoreaAuto/kr/o.php
Protocol
HTTP/1.1
Server
146.185.239.78 , Russian Federation, ASN212496 (GOOD, LV),
Reverse DNS
bronof.rn.example.com
Software
Apache /
Resource Hash
7438182b8448d119ac9a07ff7987f1e0ed0f2d4328d85793c6d3ad11800978b2

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cookchapter.com
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
*/*
Referer
http://cookchapter.com/mail/folder/file/inbox/KoreaAuto/kr/o.php
Connection
keep-alive
Cache-Control
no-cache
Referer
http://cookchapter.com/mail/folder/file/inbox/KoreaAuto/kr/o.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 21 Jul 2021 06:42:19 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
logoemail.png
yahnwagner.files.wordpress.com/2015/05/
94 KB
95 KB
Image
General
Full URL
https://yahnwagner.files.wordpress.com/2015/05/logoemail.png
Requested by
Host: cookchapter.com
URL: http://cookchapter.com/mail/folder/file/inbox/KoreaAuto/kr/o.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.22 , United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
4b89616e2a678635916096d9c0995d01703c202e96b6a5efdaf793d05fcb7238
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
http://cookchapter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-nc
HIT ams 22 np
date
Wed, 21 Jul 2021 06:42:19 GMT
x-content-type-options
nosniff
last-modified
Mon, 08 Jun 2015 01:57:39 GMT
server
nginx
accept-ranges
bytes
vary
Origin
content-type
image/png
access-control-allow-origin
https://yahnwagner.wordpress.com
x-orig-src
01_mogdir
access-control-allow-credentials
true
content-length
96547
expires
Sun, 08 Aug 2021 11:19:12 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

cookchapter.com
yahnwagner.files.wordpress.com
146.185.239.78
192.0.72.22
4b89616e2a678635916096d9c0995d01703c202e96b6a5efdaf793d05fcb7238
7438182b8448d119ac9a07ff7987f1e0ed0f2d4328d85793c6d3ad11800978b2
c0826db244bb96af36d32bb5bc7e3e6f5601deab51b44a4007a19c7a109af5c7