paypal.elvalorsocial.com
131.72.236.118  Malicious Activity!

Submitted URL: http://bit.do/dQLq5.
Effective URL: http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/
Submission: On October 14 via manual from US

Summary

This website contacted 2 IPs in 3 countries across 3 domains to perform 2 HTTP transactions. The main IP is 131.72.236.118, located in Santiago, Chile and belongs to GONZALEZ ULLOA JUAN CARLOS, CL. The main domain is paypal.elvalorsocial.com.
This is the only time paypal.elvalorsocial.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 54.83.52.76 14618 (AMAZON-AES)
2 3 131.72.236.118 263753 (GONZALEZ ...)
1 23.53.173.12 16625 (AKAMAI-AS)
2 2
Domain
Subdomains
Transfer
3 elvalorsocial.com
paypal.elvalorsocial.com
58 KB
1 paypalobjects.com
www.paypalobjects.com
5 KB
1 bit.do
.bit.do
232 B
2 3
Domain Requested by
3 paypal.elvalorsocial.com 2 redirects
1 www.paypalobjects.com paypal.elvalorsocial.com
1 bit.do 1 redirects
2 3

This site contains links to these domains. Also see Links.

Domain
www.paypal.com
Subject Issuer Validity Valid
www.paypalobjects.com
Symantec Class 3 EV SSL CA - G3
2017-07-11 -
2019-09-02
2 years crt.sh

This page contains 1 frames:

Primary Page: http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/
Frame ID: 26462.1
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://bit.do/dQLq5. HTTP 301
    http://paypal.elvalorsocial.com/ HTTP 302
    http://paypal.elvalorsocial.com/uk/cgi-bin/webscr HTTP 301
    http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

2
Requests

50 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

3
Countries

62 kB
Transfer

62 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://bit.do/dQLq5. HTTP 301
    http://paypal.elvalorsocial.com/ HTTP 302
    http://paypal.elvalorsocial.com/uk/cgi-bin/webscr HTTP 301
    http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
paypal.elvalorsocial.com/uk/cgi-bin/webscr/
Redirect Chain
  • http://bit.do/dQLq5.
  • http://paypal.elvalorsocial.com/
  • http://paypal.elvalorsocial.com/uk/cgi-bin/webscr
  • http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/
57 KB
57 KB
Document
General
Full URL
http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/
Protocol
HTTP/1.1
Server
131.72.236.118 Santiago, Chile, ASN263753 (GONZALEZ ULLOA JUAN CARLOS, CL),
Reverse DNS
srv28.benzahosting.cl
Software
Apache / PHP/5.6.31
Resource Hash
05f1e192b959ffcef029a78bd9974940d727eb13a904a212839efa93a1eaa4d3

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
paypal.elvalorsocial.com
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36

Response headers

Date
Sat, 14 Oct 2017 18:15:06 GMT
Server
Apache
Connection
Keep-Alive
X-Powered-By
PHP/5.6.31
Transfer-Encoding
chunked
Keep-Alive
timeout=5, max=98
Content-Type
text/html; charset=UTF-8

Redirect headers

Location
http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/
Date
Sat, 14 Oct 2017 18:15:06 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Content-Length
332
Content-Type
text/html; charset=iso-8859-1
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
5 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: paypal.elvalorsocial.com
URL: http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.53.173.12 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-53-173-12.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

:path
/images/shared/paypal-logo-129x32.svg
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
www.paypalobjects.com
referer
http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/
:scheme
https
:method
GET
Referer
http://paypal.elvalorsocial.com/uk/cgi-bin/webscr/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36

Response headers

date
Sat, 14 Oct 2017 18:15:10 GMT
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
accept-ranges
bytes
content-length
4945
expires
Mon, 13 Nov 2017 18:15:10 GMT

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bit.do
paypal.elvalorsocial.com
www.paypalobjects.com
131.72.236.118
23.53.173.12
54.83.52.76
05f1e192b959ffcef029a78bd9974940d727eb13a904a212839efa93a1eaa4d3
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5