![](/screenshots/03132cae-b5c8-4ff9-b418-578279c01a27.png)
www.artel.uz
Open in
urlscan Pro
80.80.218.230
Malicious Activity!
Public Scan
Effective URL: https://www.artel.uz/zil/10et80bxs2l7edbucyj8nbyt.php?secure&share=22c1021645431400a5db3a5b219415d97a872cf2852e3f49a5...
Submission: On February 22 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 17th 2022. Valid for: 3 months.
This is the only time www.artel.uz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 80.80.218.230 80.80.218.230 | 34718 (TPSUZ-AS) (TPSUZ-AS) | |
3 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
artel.uz
1 redirects
www.artel.uz |
237 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
4 | www.artel.uz |
1 redirects
www.artel.uz
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
artel.uz R3 |
2022-01-17 - 2022-04-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.artel.uz/zil/10et80bxs2l7edbucyj8nbyt.php?secure&share=22c1021645431400a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49
Frame ID: AFB3C0832D6765347935A50C4D62C6A7
Requests: 5 HTTP requests in this frame
Screenshot
![](/screenshots/03132cae-b5c8-4ff9-b418-578279c01a27.png)
Page Title
Microsoft accountPage URL History Show full URLs
-
http://www.artel.uz/zil/10et80bxs2l7edbucyj8nbyt.php?secure&share=22c1021645431400a5db3a5b219415...
HTTP 301
https://www.artel.uz/zil/10et80bxs2l7edbucyj8nbyt.php?secure&share=22c1021645431400a5db3a5b219415... Page URL
Detected technologies
Detected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.artel.uz/zil/10et80bxs2l7edbucyj8nbyt.php?secure&share=22c1021645431400a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49
HTTP 301
https://www.artel.uz/zil/10et80bxs2l7edbucyj8nbyt.php?secure&share=22c1021645431400a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49a5db3a5b219415d97a872cf2852e3f49 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
10et80bxs2l7edbucyj8nbyt.php
www.artel.uz/zil/ Redirect Chain
|
213 KB 214 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
httpserv.png
www.artel.uz/zil/img/ |
22 KB 22 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
29 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ghjghjgh54645646454545.svg
www.artel.uz/zil/naf/inf/ |
808 B 808 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 2 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone number| g_responseEnd object| FabricConfig function| setImageUrl function| _spBodyOnLoad number| g_duration number| g_iisLatency number| g_requireJSDone0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.artel.uz
80.80.218.230
29b7a9358abdc68c51db5a5af4a4f4e2e041a67527adee2366b1f84f116fe9a5
5a9ba3d0586fc50c57b65e93413e6c4fb07bb2ab9c972500da560f8a3489a2cc
84c604b5b03942f502903d4d1415babc8c5803e4234d0050b69d8dec5f5a2969
a7f32295256340841d0217175216c25139e762e795819dcbd3da0f25f7691d7d
b9347f234dc3c8d56e015e86d88a1400415db8f7a5ad91f02b6a2323c10a4187