starbrandsspa.com Open in urlscan Pro
141.94.62.242  Malicious Activity! Public Scan

URL: https://starbrandsspa.com/cr/jsp/fulls.php
Submission: On November 10 via automatic, source openphish — Scanned from FR

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 141.94.62.242, located in France and belongs to OVH, FR. The main domain is starbrandsspa.com.
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 6th 2022. Valid for: 3 months.
This is the only time starbrandsspa.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Navy Federal Credit Union (Government)

Domain & IP information

IP Address AS Autonomous System
5 141.94.62.242 16276 (OVH)
5 1
Apex Domain
Subdomains
Transfer
5 starbrandsspa.com
starbrandsspa.com
116 KB
5 1
Domain Requested by
5 starbrandsspa.com starbrandsspa.com
5 1

This site contains no links.

Subject Issuer Validity Valid
starbrands.dz
cPanel, Inc. Certification Authority
2022-11-06 -
2023-02-04
3 months crt.sh

This page contains 1 frames:

Primary Page: https://starbrandsspa.com/cr/jsp/fulls.php
Frame ID: 9AD0848970696738314B1F42E382DF16
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Navy Federal Credit Union - Account Verification

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

5
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

116 kB
Transfer

116 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request fulls.php
starbrandsspa.com/cr/jsp/
2 KB
1 KB
Document
General
Full URL
https://starbrandsspa.com/cr/jsp/fulls.php
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
141.94.62.242 , France, ASN16276 (OVH, FR),
Reverse DNS
spf.ayrade.net
Software
Apache /
Resource Hash
d6272578e2b251ccba38765252476c6a8d023d69b8073e21c693c998389cc84b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36
accept-language
fr-FR,fr;q=0.9

Response headers

Connection
Keep-Alive
Content-Encoding
gzip
Content-Length
920
Content-Type
text/html; charset=UTF-8
Date
Thu, 10 Nov 2022 13:18:03 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Vary
Accept-Encoding,User-Agent
header.PNG
starbrandsspa.com/cr/jsp/images/
25 KB
25 KB
Image
General
Full URL
https://starbrandsspa.com/cr/jsp/images/header.PNG
Requested by
Host: starbrandsspa.com
URL: https://starbrandsspa.com/cr/jsp/fulls.php
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
141.94.62.242 , France, ASN16276 (OVH, FR),
Reverse DNS
spf.ayrade.net
Software
Apache /
Resource Hash
ac5e930c36d9bd29ecf5728664b92117d713e1effa7e4eefc2dfba9b3783d392

Request headers

accept-language
fr-FR,fr;q=0.9
Referer
https://starbrandsspa.com/cr/jsp/fulls.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

Date
Thu, 10 Nov 2022 13:18:03 GMT
Last-Modified
Mon, 16 Apr 2018 15:59:22 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
25863
sigininss.PNG
starbrandsspa.com/cr/jsp/images/
34 KB
34 KB
Image
General
Full URL
https://starbrandsspa.com/cr/jsp/images/sigininss.PNG
Requested by
Host: starbrandsspa.com
URL: https://starbrandsspa.com/cr/jsp/fulls.php
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
141.94.62.242 , France, ASN16276 (OVH, FR),
Reverse DNS
spf.ayrade.net
Software
Apache /
Resource Hash
95f268067fcd1d7d7c4512eefb95c79e097c69d21835e2e8f05acb3e8a180cab

Request headers

accept-language
fr-FR,fr;q=0.9
Referer
https://starbrandsspa.com/cr/jsp/fulls.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

Date
Thu, 10 Nov 2022 13:18:03 GMT
Last-Modified
Sun, 24 Jun 2018 14:49:56 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
34621
submit2.PNG
starbrandsspa.com/cr/jsp/images/
1 KB
2 KB
Image
General
Full URL
https://starbrandsspa.com/cr/jsp/images/submit2.PNG
Requested by
Host: starbrandsspa.com
URL: https://starbrandsspa.com/cr/jsp/fulls.php
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
141.94.62.242 , France, ASN16276 (OVH, FR),
Reverse DNS
spf.ayrade.net
Software
Apache /
Resource Hash
026689cf002276e84232ef3b81b37663fe2504ea4051f6509b7b2eefbadd0006

Request headers

accept-language
fr-FR,fr;q=0.9
Referer
https://starbrandsspa.com/cr/jsp/fulls.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

Date
Thu, 10 Nov 2022 13:18:03 GMT
Last-Modified
Sun, 24 Jun 2018 14:36:28 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1494
end.PNG
starbrandsspa.com/cr/jsp/images/
53 KB
53 KB
Image
General
Full URL
https://starbrandsspa.com/cr/jsp/images/end.PNG
Requested by
Host: starbrandsspa.com
URL: https://starbrandsspa.com/cr/jsp/fulls.php
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
141.94.62.242 , France, ASN16276 (OVH, FR),
Reverse DNS
spf.ayrade.net
Software
Apache /
Resource Hash
c2e9b340b890890d30ab7b0d170f0b747827a04ced4e96e726cd5f11ec301976

Request headers

accept-language
fr-FR,fr;q=0.9
Referer
https://starbrandsspa.com/cr/jsp/fulls.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

Date
Thu, 10 Nov 2022 13:18:04 GMT
Last-Modified
Mon, 16 Apr 2018 16:08:16 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
54350

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Navy Federal Credit Union (Government)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| unhideBody

0 Cookies