my-bk-rnufg-jp-singin2.0lv6etj.cn
Open in
urlscan Pro
155.94.138.100
Malicious Activity!
Public Scan
Submission Tags: krdtest
Submission: On March 10 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on February 26th 2022. Valid for: 3 months.
This is the only time my-bk-rnufg-jp-singin2.0lv6etj.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MUFG (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 155.94.138.100 155.94.138.100 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL) | |
1 | 2606:4700:303... 2606:4700:3032::ac43:c82d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 3 |
ASN8100 (ASN-QUADRANET-GLOBAL, US)
PTR: 155.94.138.100.static.quadranet.com
my-bk-rnufg-jp-singin2.0lv6etj.cn |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
0lv6etj.cn
my-bk-rnufg-jp-singin2.0lv6etj.cn |
507 KB |
1 |
test-qi-1.buzz
www.test-qi-1.buzz |
612 B |
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | my-bk-rnufg-jp-singin2.0lv6etj.cn |
my-bk-rnufg-jp-singin2.0lv6etj.cn
|
1 | www.test-qi-1.buzz |
my-bk-rnufg-jp-singin2.0lv6etj.cn
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
my-bk-rnufg-jp-singin2.0lv6etj.cn R3 |
2022-02-26 - 2022-05-27 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-02-04 - 2023-02-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://my-bk-rnufg-jp-singin2.0lv6etj.cn/
Frame ID: 8B9346A161AEF913CB82D76A715AB375
Requests: 18 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
my-bk-rnufg-jp-singin2.0lv6etj.cn/ |
562 B 461 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.0.940107388513241645861548966.css
my-bk-rnufg-jp-singin2.0lv6etj.cn/static/css/ |
2 MB 376 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1645861548966.0.475991119690272861645861548966.js
my-bk-rnufg-jp-singin2.0lv6etj.cn/static/js/ |
238 KB 84 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.0.475991119690272861645861548966.js
my-bk-rnufg-jp-singin2.0lv6etj.cn/static/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.0.83303909764058151645861548966.js
my-bk-rnufg-jp-singin2.0lv6etj.cn/static/js/ |
1 KB 613 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mufg.php
www.test-qi-1.buzz/ |
1 B 612 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jump.php
my-bk-rnufg-jp-singin2.0lv6etj.cn/api/ |
2 B 248 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.0.83303909764058151645861548966.js
my-bk-rnufg-jp-singin2.0lv6etj.cn/static/js/ |
71 KB 45 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MUFG (Banking)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| webpackJsonp object| __core-js_shared__ object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
my-bk-rnufg-jp-singin2.0lv6etj.cn/ | Name: PHPSESSID Value: sfs60do2rravl250sodsp5v6bc |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
my-bk-rnufg-jp-singin2.0lv6etj.cn
www.test-qi-1.buzz
155.94.138.100
2606:4700:3032::ac43:c82d
159b4da7e1be69f72f4801a1287af455735447c28810185429bc0c76aba5d315
2cabbccc3abc56ba8fcea48e3cf4b167617de9647cb4d28ace844fc4ebfebbff
2e6aa065a87a4e9f3863bcd9def4dab9e73f943d06edc1b583e89c73ed0727ac
312b9fa9a58397fe88dd293b3287c3ef83b91c3233ca941aa9d0e2d600fb6a33
32cd6b48bb43a1e0476d5137505b027afe4c2b7ba8f51f9752e2477392b0b150
32f130f5fa6c1621ff325fbddb92709681cb0f96237cf078360c8d2a906e092a
39528e1be8c50f74c353e5779b1f466ee58d1c5ce7443077630355e1578e1764
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
6c7e6d6616bfe6ada2b909d851be72900e5643507f5c1aef1c97d4de0a204720
7cdfb3c9638d76088f839359838c8e866fd157949b39966fa8843c8fe0b09a9d
8fbe7f781ca130b05f7b27bd0c4563c9976739a1541aa0e453207e8ec764afec
9a577180d63af91b2384c9209e114325399e7877159eb06cfaeb8e3ac16d87f9
b768935f52cf68fde3ed1e5c9d497c747e6425deb4035a697f8ce276753b3962
d4d7d9602553b70d03ea41b99aff41ecb63f1f6ac6f85116f489b62e1377ed74
d8463bd3ba4b10e5916f65fa7b0c1f9f91f67ca40cc25b48810fb2f5a3340488
e35a2ef4a53b81daf35cd980bd377ca19ce87b2afe14870c3ce9ff6e0d6c0ea0
e49fa26ee4876e79e8c467cd465ea52c16976a5b5d48eb0debd21f9ca0e20f4f
f52668d8f2af377b3aa6812b315ad60bde5d5882dcd18949e5dbcbe641731e49