yodobashi.e-suruga.net
Open in
urlscan Pro
23.234.228.155
Malicious Activity!
Public Scan
Submission: On November 05 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by R3 on November 5th 2021. Valid for: 3 months.
This is the only time yodobashi.e-suruga.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Yodobashi Camera (E-commerce)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 23.234.228.155 23.234.228.155 | 35916 (MULTA-ASN1) (MULTA-ASN1) | |
13 | 1 |
ASN35916 (MULTA-ASN1, US)
PTR: d23-234-228-155.us-lax.sugarhosts.com
yodobashi.e-suruga.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
e-suruga.net
yodobashi.e-suruga.net |
130 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | yodobashi.e-suruga.net |
yodobashi.e-suruga.net
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
yodobashi.e-suruga.net R3 |
2021-11-05 - 2022-02-03 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://yodobashi.e-suruga.net/
Frame ID: 13E1523874D99D32D4A9549C3BC38BD2
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
yodobashi.e-suruga.net/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.dc862146.css
yodobashi.e-suruga.net/css/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
runtime.706dc4e7.js
yodobashi.e-suruga.net/js/ |
1 KB 969 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.fa3393fd.js
yodobashi.e-suruga.net/js/ |
143 KB 56 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.c7b0e522.js
yodobashi.e-suruga.net/js/ |
88 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
jump.php
yodobashi.e-suruga.net/api/ |
2 B 372 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
base.css
yodobashi.e-suruga.net/pc/css/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
elements.css
yodobashi.e-suruga.net/pc/css/ |
64 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ec.css
yodobashi.e-suruga.net/pc/css/ |
93 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api_session.php
yodobashi.e-suruga.net/api/ |
95 B 416 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DigiCert.png
yodobashi.e-suruga.net/pc/image/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logoYodobashi.png
yodobashi.e-suruga.net/pc/image/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
strcBtn30.png
yodobashi.e-suruga.net/pc/image/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Yodobashi Camera (E-commerce)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| isMobile function| loadCsstFile object| webpackJsonp object| __core-js_shared__ object| core string| type1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
yodobashi.e-suruga.net/ | Name: PHPSESSID Value: oelehuucuupih8o6sakr6243r6 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
yodobashi.e-suruga.net
23.234.228.155
01f7791f40a746c17343e9e632766eb016e1f937a614075a86e961722f4510cc
0bea0c5f67376c024caf84dc750cee37992e464fa85564a99ab36068673e8d52
202d124cfbdf21fb5f5d09094c9b9ab6523960595e009145765e24bc4050971c
363d7144b779f830a020a0094c50b679caf70ab3c834ecc889229dfb7e53d86d
637c583bdb1c1379613022f127851d3db990425e9f66668624cda693f16db640
82561c4d954eeb9c40332de1983bfea2771fbc87ce29094355a3d50fa6f308ed
a956bbc905c74b9067c65342b34c2f5ae410713596c2d1617c4026e26f7edb26
aa24bec9d5cc41f70dd6aa1ca227b10f3cfa5c385e20d9f6285b6e90bc677292
c25dc562c6d263f00d0dc9e57504c803b20d16e287a9c3e3da4b0b8cd470dc4e
c3250edf5c684cf33f32c9a1fd9a61fc11b6f72b393cb41c5b3e5db71f508c0a
c7db2e5f7623e41312bb861e3e868990203d49b0b9efd0fcf39ea3ed81cb206e
d8463bd3ba4b10e5916f65fa7b0c1f9f91f67ca40cc25b48810fb2f5a3340488
da4079b7b221876dcbfde58836e9efd2e2ff36d9d78120eb4efb9fe3abc37ba6