vkgaleria.com
Open in
urlscan Pro
50.21.176.159
Malicious Activity!
Public Scan
Effective URL: http://vkgaleria.com/file/Share_doc-file/ba6icekdzcn61k5178hhwgu1.php?rand=13InboxLightaspxn.1774256418&fid&125289964...
Submission: On September 20 via manual from US
Summary
This is the only time vkgaleria.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online) Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 45.40.140.1 45.40.140.1 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
1 | 216.172.170.39 216.172.170.39 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
1 6 | 50.21.176.159 50.21.176.159 | 8560 (ONEANDONE...) (ONEANDONE-AS Brauerstrasse 48) | |
2 | 2a00:1450:400... 2a00:1450:4001:820::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
8 | 4 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-45-40-140-1.ip.secureserver.net
www.x.co |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: web.websaz.co.uk
takfoods.co.uk |
ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE)
PTR: webserver.grama.co
vkgaleria.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
vkgaleria.com
1 redirects
vkgaleria.com |
39 KB |
2 |
googleapis.com
fonts.googleapis.com |
1 KB |
1 |
takfoods.co.uk
takfoods.co.uk |
326 B |
1 |
x.co
1 redirects
www.x.co |
214 B |
8 | 4 |
Domain | Requested by | |
---|---|---|
6 | vkgaleria.com |
1 redirects
takfoods.co.uk
vkgaleria.com |
2 | fonts.googleapis.com |
vkgaleria.com
|
1 | takfoods.co.uk | |
1 | www.x.co | 1 redirects |
8 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
takfoods.co.uk cPanel, Inc. Certification Authority |
2018-08-30 - 2018-11-28 |
3 months | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2018-08-28 - 2018-11-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://vkgaleria.com/file/Share_doc-file/ba6icekdzcn61k5178hhwgu1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
Frame ID: AF932B5D96C1D30BD731DE424939D494
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.x.co/moNi0??++==%5b%5d%5d%5b%25
HTTP 302
https://takfoods.co.uk/vmv/if.php/ Page URL
-
http://vkgaleria.com/file/Share_doc-file/
HTTP 302
http://vkgaleria.com/file/Share_doc-file/ba6icekdzcn61k5178hhwgu1.php?rand=13InboxLightaspxn.1774... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.x.co/moNi0??++==%5b%5d%5d%5b%25
HTTP 302
https://takfoods.co.uk/vmv/if.php/ Page URL
-
http://vkgaleria.com/file/Share_doc-file/
HTTP 302
http://vkgaleria.com/file/Share_doc-file/ba6icekdzcn61k5178hhwgu1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://www.x.co/moNi0??++==%5b%5d%5d%5b%25 HTTP 302
- https://takfoods.co.uk/vmv/if.php/
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
takfoods.co.uk/vmv/if.php/ Redirect Chain
|
119 B 326 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
ba6icekdzcn61k5178hhwgu1.php
vkgaleria.com/file/Share_doc-file/ Redirect Chain
|
4 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
2 KB 671 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
share-point.css
vkgaleria.com/file/Share_doc-file/css/ |
15 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
vkgaleria.com/file/Share_doc-file/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pdf.png
vkgaleria.com/file/Share_doc-file/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_strip.png
vkgaleria.com/file/Share_doc-file/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
0 625 B |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online) Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vkgaleria.com/ | Name: PHPSESSID Value: 31ns91l7gqs7dro2oosvpd4a73 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
takfoods.co.uk
vkgaleria.com
www.x.co
216.172.170.39
2a00:1450:4001:820::200a
45.40.140.1
50.21.176.159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