URL: http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.125289964...
Submission: On April 03 via automatic, source openphish — Scanned from DE

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 3 HTTP transactions. The main IP is 69.73.185.25, located in United States and belongs to NTHL, US. The main domain is theuberapps.com.
This is the only time theuberapps.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
2 69.73.185.25 11042 (NTHL)
1 104.199.236.134 396982 (GOOGLE-CL...)
3 2
Apex Domain
Subdomains
Transfer
2 theuberapps.com
theuberapps.com
33 KB
1 petstop.com.sg
petstop.com.sg
3 2
Domain Requested by
2 theuberapps.com theuberapps.com
1 petstop.com.sg theuberapps.com
3 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email&.rand=13InboxLight.aspx?n=1774256418
Frame ID: F296007E37B5E5F3AFD23FEF20A0AEA7
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Mail Verification

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • \.aspx?(?:$|\?)

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

33 kB
Transfer

32 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request boxMrenewal.php
theuberapps.com/zman/oluwabillion/oluwanishola/
1 KB
2 KB
Document
General
Full URL
http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email&.rand=13InboxLight.aspx?n=1774256418
Protocol
HTTP/1.1
Server
69.73.185.25 , United States, ASN11042 (NTHL, US),
Reverse DNS
vps.demskigroup.com
Software
Apache /
Resource Hash
56e9beb05293dbb86b0e845a5469ae226025912c2ae54c469f58e22b743140e0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Mon, 03 Apr 2023 02:20:48 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Transfer-Encoding
chunked
google_analytics_auto.js
petstop.com.sg/
0
0
Script
General
Full URL
http://petstop.com.sg/google_analytics_auto.js
Requested by
Host: theuberapps.com
URL: http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email&.rand=13InboxLight.aspx?n=1774256418
Protocol
HTTP/1.1
Server
104.199.236.134 Taipei, Taiwan, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
134.236.199.104.bc.googleusercontent.com
Software
/
Resource Hash

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://theuberapps.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

logo.png
theuberapps.com/zman/oluwabillion/oluwanishola/files/
31 KB
31 KB
Image
General
Full URL
http://theuberapps.com/zman/oluwabillion/oluwanishola/files/logo.png
Requested by
Host: theuberapps.com
URL: http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email&.rand=13InboxLight.aspx?n=1774256418
Protocol
HTTP/1.1
Server
69.73.185.25 , United States, ASN11042 (NTHL, US),
Reverse DNS
vps.demskigroup.com
Software
Apache /
Resource Hash
449f6a97abfc261ff32809775f3d6ff03624594ccf1e80a6238a44f43fadd027

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://theuberapps.com/zman/oluwabillion/oluwanishola/boxMrenewal.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=4&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&email&.rand=13InboxLight.aspx?n=1774256418
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Date
Mon, 03 Apr 2023 02:20:48 GMT
Last-Modified
Wed, 16 Mar 2022 23:00:16 GMT
Server
Apache
ETag
"196842-7bf7-5da5de0730000"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
31735

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: http://petstop.com.sg/google_analytics_auto.js
Message:
Failed to load resource: the server responded with a status of 410 (Gone)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

petstop.com.sg
theuberapps.com
104.199.236.134
69.73.185.25
449f6a97abfc261ff32809775f3d6ff03624594ccf1e80a6238a44f43fadd027
56e9beb05293dbb86b0e845a5469ae226025912c2ae54c469f58e22b743140e0