royalaccount-servicecenter9388232.brusyei1.com
Open in
urlscan Pro
2606:4700:3037::6818:6271
Malicious Activity!
Public Scan
Effective URL: https://royalaccount-servicecenter9388232.brusyei1.com/r1/royal/intro.php?freq=new&topic=tx_clam&appID=TguqopgtFNOGwYaaZZBygSaCgWWvBAJBUxrnuZneUo
Submission: On October 30 via api from QA
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on October 28th 2020. Valid for: a year.
This is the only time royalaccount-servicecenter9388232.brusyei1.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Royal Mail (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 2606:4700:303... 2606:4700:3037::6818:6271 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 2 |
ASN13335 (CLOUDFLARENET, US)
hsjueiiskoe939329.brusyei1.com | |
royalaccount-servicecenter9388232.brusyei1.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
brusyei1.com
1 redirects
hsjueiiskoe939329.brusyei1.com royalaccount-servicecenter9388232.brusyei1.com |
330 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | royalaccount-servicecenter9388232.brusyei1.com |
royalaccount-servicecenter9388232.brusyei1.com
|
1 | hsjueiiskoe939329.brusyei1.com | 1 redirects |
9 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
send.royalmail.com |
www.royalmail.com |
parcel.royalmail.com |
sendanitem.ideas.aha.io |
www.instagram.com |
www.linkedin.com |
www.facebook.com |
twitter.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-28 - 2021-10-27 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://royalaccount-servicecenter9388232.brusyei1.com/r1/royal/intro.php?freq=new&topic=tx_clam&appID=TguqopgtFNOGwYaaZZBygSaCgWWvBAJBUxrnuZneUo
Frame ID: 53AABF7442A78E87A4621A1062CBAD34
Requests: 11 HTTP requests in this frame
Frame:
https://royalaccount-servicecenter9388232.brusyei1.com/assets/images/sending-your-item-infographic.svg
Frame ID: E82CBEE3AFEC35C66F49D389E3C743F5
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://hsjueiiskoe939329.brusyei1.com/r1/index.php
HTTP 302
https://royalaccount-servicecenter9388232.brusyei1.com/r1/royal/ Page URL
- https://royalaccount-servicecenter9388232.brusyei1.com/r1/royal/intro.php?freq=new&topic=tx_clam&appID=TguqopgtFNOGwYaaZZBygSaCgWWv... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
React (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+data-react/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
16 Outgoing links
These are links going to different origins than the main page.
Title: Royal Mail
Search URL Search Domain Scan URL
Title: Send an item now
Search URL Search Domain Scan URL
Title: Help & support
Search URL Search Domain Scan URL
Title: Post Office
Search URL Search Domain Scan URL
Title: Learn more
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy policy
Search URL Search Domain Scan URL
Title: Cookie policy
Search URL Search Domain Scan URL
Title: Terms & conditions
Search URL Search Domain Scan URL
Title: Give feedback
Search URL Search Domain Scan URL
Title: Mobile app
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: 0£0.00
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://hsjueiiskoe939329.brusyei1.com/r1/index.php
HTTP 302
https://royalaccount-servicecenter9388232.brusyei1.com/r1/royal/ Page URL
- https://royalaccount-servicecenter9388232.brusyei1.com/r1/royal/intro.php?freq=new&topic=tx_clam&appID=TguqopgtFNOGwYaaZZBygSaCgWWvBAJBUxrnuZneUo Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://hsjueiiskoe939329.brusyei1.com/r1/index.php HTTP 302
- https://royalaccount-servicecenter9388232.brusyei1.com/r1/royal/
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
royalaccount-servicecenter9388232.brusyei1.com/r1/royal/ Redirect Chain
|
195 B 584 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
intro.php
royalaccount-servicecenter9388232.brusyei1.com/r1/royal/ |
563 KB 328 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
24 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
260 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chevinstd-bold.woff2
royalaccount-servicecenter9388232.brusyei1.com/assets/fonts/chevin/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chevinstd-medium.woff2
royalaccount-servicecenter9388232.brusyei1.com/assets/fonts/chevin/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chevinstd-light.woff2
royalaccount-servicecenter9388232.brusyei1.com/assets/fonts/chevin/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chevinstd-light.woff
royalaccount-servicecenter9388232.brusyei1.com/assets/fonts/chevin/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chevinstd-bold.woff
royalaccount-servicecenter9388232.brusyei1.com/assets/fonts/chevin/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chevinstd-medium.woff
royalaccount-servicecenter9388232.brusyei1.com/assets/fonts/chevin/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sending-your-item-infographic.svg
royalaccount-servicecenter9388232.brusyei1.com/assets/images/ Frame E82C |
308 B 531 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Royal Mail (Government)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
royalaccount-servicecenter9388232.brusyei1.com/ | Name: PHPSESSID Value: j6ol9m9ak5e1chmbr312q6u8o9 |
|
.brusyei1.com/ | Name: __cfduid Value: d2c20cf2127d3cdd40c4c8388de8dc9b81604025407 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hsjueiiskoe939329.brusyei1.com
royalaccount-servicecenter9388232.brusyei1.com
2606:4700:3037::6818:6271
027e325b7fcf7957d891823ddf2a7873869aa9bbdb26d645324372aeffba154c
2087a094b0a427d552413baedcf0e1d92b442e44c8dd7a4c517c569b4b76c038
2fc8c7cb39825b0c5fcf608136ac9c79aced90c297c0db611b0412848078e48e
8a5265a7b3722827df28fba54c4b28bf7499aad0debb5c6fa2bd0a4d3b2ba815
b7b07b69900fa88d10d2cf1662fdf3e78104e9f72d93424eac5ec63ec3a6c43d
c91c67f0bc2b4505e9d0d8726828dfce4b0c2e347e158f881826efb44863b636