qip3oi4hv.icu
Open in
urlscan Pro
107.173.167.64
Malicious Activity!
Public Scan
Submission Tags: #phishing @quicksandphish Search All
Submission: On September 26 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by R3 on September 25th 2022. Valid for: 3 months.
This is the only time qip3oi4hv.icu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Mizuho Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 107.173.167.64 107.173.167.64 | 36352 (AS-COLOCR...) (AS-COLOCROSSING) | |
10 | 1 |
ASN36352 (AS-COLOCROSSING, US)
PTR: mail6.hbczqmux.com
qip3oi4hv.icu |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
qip3oi4hv.icu
qip3oi4hv.icu |
192 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | qip3oi4hv.icu |
qip3oi4hv.icu
|
10 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.mizuhobank.co.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
qip3oi4hv.icu R3 |
2022-09-25 - 2022-12-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://qip3oi4hv.icu/client/index_sp.php
Frame ID: 944FB6625EE2005DFD6D767663B58B2F
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
みずほダイレクトDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- (?:/([\d.]+))?/vue(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: みずほ銀行WEBサイト
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index_sp.php
qip3oi4hv.icu/client/ |
9 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spreset.css
qip3oi4hv.icu/css/ |
746 B 548 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spcommon.css
qip3oi4hv.icu/css/ |
40 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
i00000.css
qip3oi4hv.icu/css/ |
1 KB 509 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loginBannerSp.gif
qip3oi4hv.icu/img/ |
6 KB 6 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue.js
qip3oi4hv.icu/js/ |
334 KB 89 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.js
qip3oi4hv.icu/js/ |
281 KB 83 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_sp.js
qip3oi4hv.icu/js/ |
869 B 600 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pc_ipn01.gif
qip3oi4hv.icu/images/ |
260 B 260 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
help.gif
qip3oi4hv.icu/images/ |
260 B 260 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Mizuho Bank (Banking)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| Vue function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
qip3oi4hv.icu/ | Name: PHPSESSID Value: af8ipl2phtpseqrbik118rnj53 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
qip3oi4hv.icu
107.173.167.64
29116bd4a31f00e75cd50c2b2ea0d387a3e11f311cceaed9f750dc1f7a7d6dea
2fead80f99c09429bc0379e06d117fad24dc7c7052b1e6f223147bfb3dd2d8a5
352baa818da109925437a8433057ddc6f91ec48efe88bc5741b2f9e34450fdce
416a3b2c3bf16d64f6b5b6d0f7b079df2267614dd6847fc2f3271b4409233c37
467ced84e1cc9309b6542b7d0b912f66e018b07032e245fdcea5591f5ac43af8
9f2e3ddddd9f0ba1c661d9bee79335a4d1d814b979b73ac89a561e277b5e20ac
e077e318c22e3aef42a08e74933f8e3fe39f143eb9ff97adf1fc321108d1b901
ee01d14e00ada3492d97c9c3a933c242a3bbf7663772af9454c9e55359fbdcb3
f194ad285412d17cf55c452c26398e21b48585f66783f6be6e6a07f5ee3588c7