srv88734.ht-test.ru Open in urlscan Pro
78.110.50.131  Malicious Activity! Public Scan

Submitted URL: http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source
Effective URL: http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email=
Submission: On July 09 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 78.110.50.131, located in Moscow, Russian Federation and belongs to HT-SYSTEMS-AS Uplinks:, RU. The main domain is srv88734.ht-test.ru.
This is the only time srv88734.ht-test.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: LinkedIn (Social Network)

Domain & IP information

IP Address AS Autonomous System
1 5 78.110.50.131 31240 (HT-SYSTEM...)
4 1
Apex Domain
Subdomains
Transfer
5 ht-test.ru
srv88734.ht-test.ru
73 KB
4 1
Domain Requested by
5 srv88734.ht-test.ru 1 redirects srv88734.ht-test.ru
4 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email=
Frame ID: C19DCB8A2A10E18D862FD7129AD4A0CD
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source HTTP 301
    http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/ Page URL
  2. http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email= Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /php\/?([\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • headers server /Red Hat/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

73 kB
Transfer

71 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source HTTP 301
    http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/ Page URL
  2. http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source HTTP 301
  • http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/
Redirect Chain
  • http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source
  • http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/
435 B
635 B
Document
General
Full URL
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/
Protocol
HTTP/1.1
Server
78.110.50.131 Moscow, Russian Federation, ASN31240 (HT-SYSTEMS-AS Uplinks:, RU),
Reverse DNS
cl33-w.ht-systems.ru
Software
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40 / PHP/5.6.40
Resource Hash
2282cba56437ae11ce6066f8abe8b1fc6cbda9cd011bd9e8c84b3fbe01f2f8ee

Request headers

Host
srv88734.ht-test.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 09 Jul 2020 01:50:04 GMT
Server
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40
X-Powered-By
PHP/5.6.40
Content-Length
435
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 09 Jul 2020 01:50:04 GMT
Server
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40
Location
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/
Content-Length
375
Content-Type
text/html; charset=iso-8859-1
Primary Request root.php
srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/
41 KB
41 KB
Document
General
Full URL
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email=
Protocol
HTTP/1.1
Server
78.110.50.131 Moscow, Russian Federation, ASN31240 (HT-SYSTEMS-AS Uplinks:, RU),
Reverse DNS
cl33-w.ht-systems.ru
Software
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40 / PHP/5.6.40
Resource Hash
c55ab98d6f0409b453625cb1e4550d5587cb06416f8947103293ebb4517d0833

Request headers

Host
srv88734.ht-test.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/

Response headers

Date
Thu, 09 Jul 2020 01:50:05 GMT
Server
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40
X-Powered-By
PHP/5.6.40
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
logo.png
srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/includes/
28 KB
29 KB
Image
General
Full URL
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/includes/logo.png
Requested by
Host: srv88734.ht-test.ru
URL: http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email=
Protocol
HTTP/1.1
Server
78.110.50.131 Moscow, Russian Federation, ASN31240 (HT-SYSTEMS-AS Uplinks:, RU),
Reverse DNS
cl33-w.ht-systems.ru
Software
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40 /
Resource Hash
3b631974aee80b76672d3bc06f0a510ddff66171ccd08204854e7c776c217bf1

Request headers

Referer
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 09 Jul 2020 01:50:05 GMT
X-Cache-Lookup
MISS from hc1.hts.ru:80
Last-Modified
Tue, 07 Jul 2020 20:46:09 GMT
Server
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40
ETag
"806a4d0a-71bc-5a9e014c61da5"
X-Cache
MISS from hc1.hts.ru
Content-Type
image/png
Accept-Ranges
bytes
Content-Length
29116
footer.jpg
srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/includes/
2 KB
2 KB
Image
General
Full URL
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/includes/footer.jpg
Requested by
Host: srv88734.ht-test.ru
URL: http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email=
Protocol
HTTP/1.1
Server
78.110.50.131 Moscow, Russian Federation, ASN31240 (HT-SYSTEMS-AS Uplinks:, RU),
Reverse DNS
cl33-w.ht-systems.ru
Software
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40 /
Resource Hash
ed91c63ec53a53f3af6c3b22c495ce6ba439486cc54fa753733efa831ad51fcf

Request headers

Referer
http://srv88734.ht-test.ru/shell/ab/LinkedIn2.0.6/source/root.php?email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 09 Jul 2020 01:50:05 GMT
X-Cache-Lookup
MISS from hc2.hts.ru:80
Last-Modified
Tue, 07 Jul 2020 20:46:09 GMT
Server
Apache/2.2.24 (Red Hat) mod_rpaf/0.6 PHP/5.6.40
ETag
"806a4ce9-62d-5a9e014c61da5"
X-Cache
MISS from hc2.hts.ru
Content-Type
image/jpeg
Accept-Ranges
bytes
Content-Length
1581

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: LinkedIn (Social Network)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies