URL: https://baerb.kozow.com/load/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.1252899...
Submission: On June 26 via manual from MX

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 63.250.45.43, located in Los Angeles, United States and belongs to NAMECHEAP-NET, US. The main domain is baerb.kozow.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on June 23rd 2020. Valid for: 3 months.
This is the only time baerb.kozow.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook (Online)

Domain & IP information

IP Address AS Autonomous System
3 63.250.45.43 22612 (NAMECHEAP...)
3 1
Apex Domain
Subdomains
Transfer
3 kozow.com
baerb.kozow.com
27 KB
3 1
Domain Requested by
3 baerb.kozow.com baerb.kozow.com
3 1

This site contains no links.

Subject Issuer Validity Valid
webmail.baerb.kozow.com
Let's Encrypt Authority X3
2020-06-23 -
2020-09-21
3 months crt.sh

This page contains 1 frames:

Primary Page: https://baerb.kozow.com/load/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Frame ID: 801E27C2E3A613A9CF5529419CF47E56
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

27 kB
Transfer

26 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
baerb.kozow.com/load/
2 KB
2 KB
Document
General
Full URL
https://baerb.kozow.com/load/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.250.45.43 Los Angeles, United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server1.mixingspirits.com
Software
Apache /
Resource Hash
380f6631e05fc205066d99d5201e2d56676de945bfdce1718a891fba15df6078

Request headers

Host
baerb.kozow.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 26 Jun 2020 00:33:07 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
w1.png
baerb.kozow.com/load/images/
23 KB
24 KB
Image
General
Full URL
https://baerb.kozow.com/load/images/w1.png
Requested by
Host: baerb.kozow.com
URL: https://baerb.kozow.com/load/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.250.45.43 Los Angeles, United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server1.mixingspirits.com
Software
Apache /
Resource Hash
9b34dd576a3b9cb8c016629accc2a1e5c6029eb9bd833986c797751c5fd81f0f

Request headers

Referer
https://baerb.kozow.com/load/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 26 Jun 2020 00:33:07 GMT
Last-Modified
Thu, 10 Oct 2019 22:01:40 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
23865
btns.png
baerb.kozow.com/load/images/
1 KB
2 KB
Image
General
Full URL
https://baerb.kozow.com/load/images/btns.png
Requested by
Host: baerb.kozow.com
URL: https://baerb.kozow.com/load/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.250.45.43 Los Angeles, United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server1.mixingspirits.com
Software
Apache /
Resource Hash
e7b1ae1295c035200890c89d9106c0e3287620daacf9ac95e8d2c1f1b9943ffb

Request headers

Referer
https://baerb.kozow.com/load/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 26 Jun 2020 00:33:08 GMT
Last-Modified
Fri, 02 Aug 2019 23:48:38 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
1414

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook (Online)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

baerb.kozow.com
63.250.45.43
380f6631e05fc205066d99d5201e2d56676de945bfdce1718a891fba15df6078
9b34dd576a3b9cb8c016629accc2a1e5c6029eb9bd833986c797751c5fd81f0f
e7b1ae1295c035200890c89d9106c0e3287620daacf9ac95e8d2c1f1b9943ffb