Submitted URL: https://bit.ly/2DyIqe7
Effective URL: https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Submission: On March 16 via api from US

Summary

This website contacted 2 IPs in 3 countries across 3 domains to perform 5 HTTP transactions. The main IP is 94.177.249.118, located in Slough, United Kingdom and belongs to ARUBACLOUDLTD-ASN, GB. The main domain is jixehoq.cf.
TLS certificate: Issued by cPanel, Inc. Certification Authority on March 14th 2018. Valid for: 3 months.
This is the only time jixehoq.cf was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Office 365 (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 67.199.248.10 395224 (BITLY-AS)
1 217.61.21.40 199883 (ARUBACLOU...)
4 94.177.249.118 199883 (ARUBACLOU...)
5 2
Apex Domain
Subdomains
Transfer
4 jixehoq.cf
jixehoq.cf
231 KB
1 fake-luv-rguno.ml
fake-luv-rguno.ml
573 B
1 bit.ly
bit.ly
440 B
5 3
Domain Requested by
4 jixehoq.cf jixehoq.cf
1 fake-luv-rguno.ml
1 bit.ly 1 redirects
5 3

This site contains no links.

Subject Issuer Validity Valid
fake-luv-rguno.ml
cPanel, Inc. Certification Authority
2018-03-16 -
2018-06-14
3 months crt.sh
jixehoq.cf
cPanel, Inc. Certification Authority
2018-03-14 -
2018-06-12
3 months crt.sh

This page contains 1 frames:

Primary Page: https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Frame ID: AA5990CACC6B5F2B4829F33BC9EBE7D9
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://bit.ly/2DyIqe7 HTTP 301
    https://fake-luv-rguno.ml/KOKOVerifyAccount.php Page URL
  2. https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

5
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

3
Countries

231 kB
Transfer

230 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://bit.ly/2DyIqe7 HTTP 301
    https://fake-luv-rguno.ml/KOKOVerifyAccount.php Page URL
  2. https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://bit.ly/2DyIqe7 HTTP 301
  • https://fake-luv-rguno.ml/KOKOVerifyAccount.php

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
KOKOVerifyAccount.php
fake-luv-rguno.ml/
Redirect Chain
  • https://bit.ly/2DyIqe7
  • https://fake-luv-rguno.ml/KOKOVerifyAccount.php
365 B
573 B
Document
General
Full URL
https://fake-luv-rguno.ml/KOKOVerifyAccount.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.61.21.40 Arezzo, Italy, ASN199883 (ARUBACLOUDLTD-ASN, GB),
Reverse DNS
host40-21-61-217.static.arubacloud.com
Software
Apache /
Resource Hash

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fake-luv-rguno.ml
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Fri, 16 Mar 2018 23:01:11 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Content-Security-Policy
referrer always;
Referrer-Policy
unsafe-url
Server
nginx
Date
Fri, 16 Mar 2018 23:01:11 GMT
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Location
https://fake-luv-rguno.ml/KOKOVerifyAccount.php
Cache-Control
private, max-age=90
Set-Cookie
_bit=i2gn1b-77b9380b9c860eea3e-00d; Domain=bit.ly; Expires=Wed, 12 Sep 2018 23:01:11 GMT
Content-Length
134
Primary Request index.php
jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/
2 KB
2 KB
Document
General
Full URL
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.177.249.118 Slough, United Kingdom, ASN199883 (ARUBACLOUDLTD-ASN, GB),
Reverse DNS
host118-249-177-94.static.arubacloud.com
Software
Apache /
Resource Hash
c3bff548a736cb85b28c666ac187d8991da097130ebe98e72f8620c665b646d8

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
jixehoq.cf
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://fake-luv-rguno.ml/KOKOVerifyAccount.php
Connection
keep-alive
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
Referer
https://fake-luv-rguno.ml/KOKOVerifyAccount.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Fri, 16 Mar 2018 23:01:10 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
2096
Content-Type
text/html; charset=UTF-8
officelogo.png
jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/
16 KB
17 KB
Image
General
Full URL
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/officelogo.png
Requested by
Host: jixehoq.cf
URL: https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.177.249.118 Slough, United Kingdom, ASN199883 (ARUBACLOUDLTD-ASN, GB),
Reverse DNS
host118-249-177-94.static.arubacloud.com
Software
Apache /
Resource Hash
58c8851cbf14153c9559ec9159d74091d633fc08d3e792299f208866c07da331

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
jixehoq.cf
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Connection
keep-alive
Cache-Control
no-cache
Referer
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Fri, 16 Mar 2018 23:01:10 GMT
Last-Modified
Fri, 03 Nov 2017 20:08:14 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
16742
footer.png
jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/
13 KB
13 KB
Image
General
Full URL
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/footer.png
Requested by
Host: jixehoq.cf
URL: https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.177.249.118 Slough, United Kingdom, ASN199883 (ARUBACLOUDLTD-ASN, GB),
Reverse DNS
host118-249-177-94.static.arubacloud.com
Software
Apache /
Resource Hash
64bd1b3c6ec1e8374d5ba6d3416c3afc59bdfbf69c5453e17efc48d33becd3ef

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
jixehoq.cf
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Connection
keep-alive
Cache-Control
no-cache
Referer
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Fri, 16 Mar 2018 23:01:10 GMT
Last-Modified
Fri, 03 Nov 2017 20:08:16 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
13220
officebg.jpg
jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/
199 KB
199 KB
Image
General
Full URL
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/officebg.jpg
Requested by
Host: jixehoq.cf
URL: https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.177.249.118 Slough, United Kingdom, ASN199883 (ARUBACLOUDLTD-ASN, GB),
Reverse DNS
host118-249-177-94.static.arubacloud.com
Software
Apache /
Resource Hash
7e50e406688bd898803f653058d14ca384734cb9b39ba900bc5e2734b59c073b

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
jixehoq.cf
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
Connection
keep-alive
Cache-Control
no-cache
Referer
https://jixehoq.cf/~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_~!@%23$%25%5e&*()_/office365/index.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Fri, 16 Mar 2018 23:01:10 GMT
Last-Modified
Fri, 03 Nov 2017 20:08:14 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
203294

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Office 365 (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies