Submitted URL: https://store.pandasecurity.com/300/cookie?affiliate=45960&redirectto=https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinn...
Effective URL: https://tinefard.ga/yA2VDcHSYUOhpv7RPrtGmql4BKMfX0TbkQ3o1uwWxIL6J5FECgn9NzsZie8jngCL0p4rPmRq8ToKN3GwhQxZ7JXFuYyWjlUi...
Submission: On November 25 via manual from IT — Scanned from IT

Summary

This website contacted 3 IPs in 2 countries across 4 domains to perform 4 HTTP transactions. The main IP is 162.241.67.201, located in United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is tinefard.ga.
TLS certificate: Issued by R3 on November 24th 2021. Valid for: 3 months.
This is the only time tinefard.ga was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 1 104.16.243.229 13335 (CLOUDFLAR...)
1 2606:4700:303... 13335 (CLOUDFLAR...)
3 162.241.67.201 46606 (UNIFIEDLA...)
4 3
Apex Domain
Subdomains
Transfer
2 tinefard.ga
tinefard.ga
90 KB
1 raletait.ga
911821.raletait.ga
538 B
1 ru.net
www.aygizcr.ru.net
796 B
1 pandasecurity.com
store.pandasecurity.com
491 B
4 4
Domain Requested by
2 tinefard.ga 911821.raletait.ga
tinefard.ga
1 911821.raletait.ga www.aygizcr.ru.net
1 www.aygizcr.ru.net
1 store.pandasecurity.com 1 redirects
4 4

This site contains links to these domains. Also see Links.

Domain
www.microsoft.com
privacy.microsoft.com
Subject Issuer Validity Valid
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-11-25 -
2022-11-24
a year crt.sh
*.raletait.ga
R3
2021-11-24 -
2022-02-22
3 months crt.sh
www.tinefard.ga
R3
2021-11-24 -
2022-02-22
3 months crt.sh

This page contains 1 frames:

Primary Page: https://tinefard.ga/yA2VDcHSYUOhpv7RPrtGmql4BKMfX0TbkQ3o1uwWxIL6J5FECgn9NzsZie8jngCL0p4rPmRq8ToKN3GwhQxZ7JXFuYyWjlUiIOcsHSA5DE1M2e9BbVaz6kvf5JtkFMKIAgLUWPbwlfzQ9hr1yNHOv7Y6iVuCBnemZDp34SjqaT8Rc0GxXs2E5h9UbzRnjXgrT8cM4ZKoVefqHlBE3D2IwxWCtyuYP0kmA1iSJOasN6pL7vGF/M1hKsINXTlDepUFE4WRfmjJ5wBgqy7bvZ29Sa6PkxC3tcYzAQnouL8OVrGi0.php
Frame ID: 1EA52297CF037EC3195E1ADC792C0FC6
Requests: 11 HTTP requests in this frame

Screenshot

Page Title

Sign in to Outlook

Page URL History Show full URLs

  1. https://store.pandasecurity.com/300/cookie?affiliate=45960&redirectto=https://www.aygizcr.ru.net/W9214/1;h=b... HTTP 302
    https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com Page URL
  2. https://911821.raletait.ga/ Page URL
  3. https://tinefard.ga/bruno.morelli@loropiana.com Page URL
  4. https://tinefard.ga/yA2VDcHSYUOhpv7RPrtGmql4BKMfX0TbkQ3o1uwWxIL6J5FECgn9NzsZie8jngCL0p4rPmRq8ToK... Page URL

Page Statistics

4
Requests

100 %
HTTPS

33 %
IPv6

4
Domains

4
Subdomains

3
IPs

2
Countries

91 kB
Transfer

118 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://store.pandasecurity.com/300/cookie?affiliate=45960&redirectto=https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com HTTP 302
    https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com Page URL
  2. https://911821.raletait.ga/ Page URL
  3. https://tinefard.ga/bruno.morelli@loropiana.com Page URL
  4. https://tinefard.ga/yA2VDcHSYUOhpv7RPrtGmql4BKMfX0TbkQ3o1uwWxIL6J5FECgn9NzsZie8jngCL0p4rPmRq8ToKN3GwhQxZ7JXFuYyWjlUiIOcsHSA5DE1M2e9BbVaz6kvf5JtkFMKIAgLUWPbwlfzQ9hr1yNHOv7Y6iVuCBnemZDp34SjqaT8Rc0GxXs2E5h9UbzRnjXgrT8cM4ZKoVefqHlBE3D2IwxWCtyuYP0kmA1iSJOasN6pL7vGF/M1hKsINXTlDepUFE4WRfmjJ5wBgqy7bvZ29Sa6PkxC3tcYzAQnouL8OVrGi0.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://store.pandasecurity.com/300/cookie?affiliate=45960&redirectto=https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com HTTP 302
  • https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
1;h=brunoja87822morellinnj88377loropianaja87822com
www.aygizcr.ru.net/W9214/
Redirect Chain
  • https://store.pandasecurity.com/300/cookie?affiliate=45960&redirectto=https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com
  • https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com
121 B
796 B
Document
General
Full URL
https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::ac43:995e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
it-IT,it;q=0.9

Response headers

date
Thu, 25 Nov 2021 09:24:45 GMT
content-type
text/html; charset=UTF-8
expires
Wed, 11 Jan 1984 05:00:00 GMT
cache-control
no-cache, must-revalidate, max-age=0
link
<https://synepsepdi.com/wp-json/>; rel="https://api.w.org/"
vary
Accept-Encoding
x-turbo-charged-by
LiteSpeed
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=fQm60kn0lgdahJPa3J6uXERfJEG6Fz1BtDMP7gsGAdih%2F9wQzMokR1v4NS3fKDQARx70WAHWciUApesOJFEqF6jcm6jtAGje1McJBA%2BUIwhmcNKT5Ds9flcDtmLUGO88zepGE8nen4uH09%2F8UQDomhQ%3D"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
cf-ray
6b39d367accb375d-MXP
content-encoding
br
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400

Redirect headers

date
Thu, 25 Nov 2021 09:24:45 GMT
content-type
text/html; charset=utf-8
cache-control
private
location
https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com
vary
Accept-Encoding,User-Agent
content-encoding
gzip
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
6b39d3660e453745-MXP
/
911821.raletait.ga/
330 B
538 B
Document
General
Full URL
https://911821.raletait.ga/
Requested by
Host: www.aygizcr.ru.net
URL: https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.241.67.201 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-67-201.unifiedlayer.com
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
it-IT,it;q=0.9
Referer
https://www.aygizcr.ru.net/

Response headers

Date
Thu, 25 Nov 2021 09:24:45 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
bruno.morelli@loropiana.com
tinefard.ga/
348 B
730 B
Document
General
Full URL
https://tinefard.ga/bruno.morelli@loropiana.com
Requested by
Host: 911821.raletait.ga
URL: https://911821.raletait.ga/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.241.67.201 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-67-201.unifiedlayer.com
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
it-IT,it;q=0.9
Referer
https://911821.raletait.ga/

Response headers

Date
Thu, 25 Nov 2021 09:24:46 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Primary Request M1hKsINXTlDepUFE4WRfmjJ5wBgqy7bvZ29Sa6PkxC3tcYzAQnouL8OVrGi0.php
tinefard.ga/yA2VDcHSYUOhpv7RPrtGmql4BKMfX0TbkQ3o1uwWxIL6J5FECgn9NzsZie8jngCL0p4rPmRq8ToKN3GwhQxZ7JXFuYyWjlUiIOcsHSA5DE1M2e9BbVaz6kvf5JtkFMKIAgLUWPbwlfzQ9hr1yNHOv7Y6iVuCBnemZDp34SjqaT8Rc0GxXs2E5h9Ub...
89 KB
89 KB
Document
General
Full URL
https://tinefard.ga/yA2VDcHSYUOhpv7RPrtGmql4BKMfX0TbkQ3o1uwWxIL6J5FECgn9NzsZie8jngCL0p4rPmRq8ToKN3GwhQxZ7JXFuYyWjlUiIOcsHSA5DE1M2e9BbVaz6kvf5JtkFMKIAgLUWPbwlfzQ9hr1yNHOv7Y6iVuCBnemZDp34SjqaT8Rc0GxXs2E5h9UbzRnjXgrT8cM4ZKoVefqHlBE3D2IwxWCtyuYP0kmA1iSJOasN6pL7vGF/M1hKsINXTlDepUFE4WRfmjJ5wBgqy7bvZ29Sa6PkxC3tcYzAQnouL8OVrGi0.php
Requested by
Host: tinefard.ga
URL: https://tinefard.ga/bruno.morelli@loropiana.com
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.241.67.201 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-67-201.unifiedlayer.com
Software
Apache /
Resource Hash
1fbfce803a7440821870dbc8f3ed29dd2a2fd46d5dda2edfe23f16c228d9d16b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
it-IT,it;q=0.9
Referer
https://tinefard.ga/bruno.morelli@loropiana.com

Response headers

Date
Thu, 25 Nov 2021 09:24:46 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
truncated
/
987 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8b34a475187302935336bf43a2bf2a4e0adb9a1e87953ea51f6fcf0ef52a4a1d

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
17 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d8f5ab3e00202fd3b45be1acd95d677b137064001e171bc79b06826d98f1e1d3

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e4e1e65871749d18aea150643c07e0aab2057da057c6c57ec1c3c43580e1c898

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7b1669da90261cdb1483950bb480ad96875f84b09bc48d1055303ce94821bf64

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
899 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b7fcd37eaafe3f08647ed072d5289eadfff6c660a26cdef31532b3fcfb4a0bb2

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
222 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
749f85621d92a5b31b2a377a8c385a36d48a83327dad9a8a8da93cd831b8c9a2

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler

3 Cookies

Domain/Path Name / Value
.store.pandasecurity.com/ Name: cbsession2
Value: ol6l24uUcv54gGA
.store.pandasecurity.com/ Name: session0_o_300
Value: affiliate=45960
tinefard.ga/ Name: PHPSESSID
Value: 7596c3e9226a94171508cd8f7a1d162e

1 Console Messages

Source Level URL
Text
network error URL: https://www.aygizcr.ru.net/W9214/1;h=brunoja87822morellinnj88377loropianaja87822com
Message:
Failed to load resource: the server responded with a status of 404 ()