www2.updateuccard.cyou
Open in
urlscan Pro
107.173.187.244
Malicious Activity!
Public Scan
Submission: On January 17 via automatic, source phishtank
Summary
TLS certificate: Issued by R3 on January 16th 2021. Valid for: 3 months.
This is the only time www2.updateuccard.cyou was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: UC Card (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 107.173.187.244 107.173.187.244 | 36352 (AS-COLOCR...) (AS-COLOCROSSING) | |
8 | 210.151.8.173 210.151.8.173 | 4725 (ODN SoftB...) (ODN SoftBank Corp.) | |
5 | 210.151.8.101 210.151.8.101 | 4725 (ODN SoftB...) (ODN SoftBank Corp.) | |
14 | 3 |
ASN36352 (AS-COLOCROSSING, US)
PTR: 107-173-187-244-host.colocrossing.com
www2.updateuccard.cyou |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
saisoncard.co.jp
api.saisoncard.co.jp |
215 KB |
5 |
a-q-f.com
www.a-q-f.com |
2 KB |
1 |
updateuccard.cyou
www2.updateuccard.cyou |
4 KB |
14 | 3 |
Domain | Requested by | |
---|---|---|
8 | api.saisoncard.co.jp |
www2.updateuccard.cyou
api.saisoncard.co.jp |
5 | www.a-q-f.com |
www2.updateuccard.cyou
www.a-q-f.com |
1 | www2.updateuccard.cyou | |
14 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
atunet.uccard.co.jp |
www2.uccard.co.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.updateuccard.buzz R3 |
2021-01-16 - 2021-04-16 |
3 months | crt.sh |
api.saisoncard.co.jp Cybertrust Japan SureServer EV CA G3 |
2020-12-02 - 2021-12-31 |
a year | crt.sh |
www.a-q-f.com Cybertrust Japan SureServer EV CA G3 |
2020-03-23 - 2021-05-31 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://www2.updateuccard.cyou/
Frame ID: 7C90E4AE828A568D7AADA75CA65FC381
Requests: 13 HTTP requests in this frame
Frame:
https://api.saisoncard.co.jp/html/UC/PC/iframe/index.html
Frame ID: 4404F2375F50DAB590F03D4E0CC1175E
Requests: 1 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Title: こちら
Search URL Search Domain Scan URL
Title: よくあるお問い合わせ
Search URL Search Domain Scan URL
Title: メンテナンス情報
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www2.updateuccard.cyou/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
api.saisoncard.co.jp/auth/resources/css/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
layout.css
api.saisoncard.co.jp/auth/resources/css/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_uccard.jpg
api.saisoncard.co.jp//auth/resources/img/logo/ |
7 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
key_ani.gif
api.saisoncard.co.jp/auth/resources/img/ |
177 KB 178 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s_code.js
www.a-q-f.com/saison/sc/atu/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s_code_prd.js
www.a-q-f.com/saison/sc/atu/ |
0 342 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
remove_dmp_prd.js
www.a-q-f.com/saison/sc/atu/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.html
api.saisoncard.co.jp/html/UC/PC/iframe/ Frame 4404 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon01.gif
api.saisoncard.co.jp/auth/resources/img/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ie8_btnBG2.png
api.saisoncard.co.jp/auth/resources/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ie8_btnBG.png
api.saisoncard.co.jp/auth/resources/img/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
remove_dmp_prd.js
www.a-q-f.com/saison/sc/atu/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
remove_dmp_prd.js
www.a-q-f.com/saison/sc/atu/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: UC Card (Financial)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| fun function| fun1 function| fun3 string| dev_domainList object| dev_domainList_split number| dev_flg object| dd number| yy0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.saisoncard.co.jp
www.a-q-f.com
www2.updateuccard.cyou
107.173.187.244
210.151.8.101
210.151.8.173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