mufgpxpwf.tokyo
Open in
urlscan Pro
193.143.1.205
Malicious Activity!
Public Scan
Effective URL: https://mufgpxpwf.tokyo/sigin/mufgpxpwf.php?e849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f7...
Submission Tags: phishing
Submission: On June 25 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R11 on June 25th 2024. Valid for: 3 months.
This is the only time mufgpxpwf.tokyo was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MUFG (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 27 | 193.143.1.205 193.143.1.205 | 198953 (PROTON66) (PROTON66) | |
1 | 2606:4700:311... 2606:4700:3110::6812:33de | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
27 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
27 |
mufgpxpwf.tokyo
1 redirects
mufgpxpwf.tokyo |
282 KB |
1 |
bootcdn.net
cdn.bootcdn.net — Cisco Umbrella Rank: 99187 |
3 KB |
27 | 2 |
Domain | Requested by | |
---|---|---|
27 | mufgpxpwf.tokyo |
1 redirects
mufgpxpwf.tokyo
|
1 | cdn.bootcdn.net |
mufgpxpwf.tokyo
|
27 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
directg.s.bk.mufg.jp |
direct.bk.mufg.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
mufgpxpwf.tokyo R11 |
2024-06-25 - 2024-09-23 |
3 months | crt.sh |
cdn.bootcdn.net E6 |
2024-06-10 - 2024-09-08 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://mufgpxpwf.tokyo/sigin/mufgpxpwf.php?e849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77e
Frame ID: 26A7A82CF424E70A5EB555CC7383BAFD
Requests: 26 HTTP requests in this frame
Frame:
https://mufgpxpwf.tokyo/sigin/index_1.html
Frame ID: 522973A03C14448DDCF8475D020AD16A
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
ログイン - 三菱UFJダイレクトPage URL History Show full URLs
-
https://mufgpxpwf.tokyo/
HTTP 302
https://mufgpxpwf.tokyo/sigin/mufgpxpwf.php?e849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
6 Outgoing links
These are links going to different origins than the main page.
Title: 新規ウィンドウが開きます。 ヘルプ
Search URL Search Domain Scan URL
Title: くわしくはこちら
Search URL Search Domain Scan URL
Title: 新規ウィンドウが開きます。店舗一覧
Search URL Search Domain Scan URL
Title: 新規ウィンドウが開きます。三菱UFJダイレクトについて
Search URL Search Domain Scan URL
Title: チャットでお問い合わせ
Search URL Search Domain Scan URL
Title: よくある質問・お問い合わせ
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://mufgpxpwf.tokyo/
HTTP 302
https://mufgpxpwf.tokyo/sigin/mufgpxpwf.php?e849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77ee849df1552f72dc4220d92db0f9ad77e Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
mufgpxpwf.php
mufgpxpwf.tokyo/sigin/ Redirect Chain
|
30 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.0.3.js
mufgpxpwf.tokyo/js/ |
245 KB 71 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
mufgpxpwf.tokyo/js/ |
59 KB 15 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.js
mufgpxpwf.tokyo/js/ |
20 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
mufgpxpwf.tokyo/css/ |
232 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
mufgpxpwf.tokyo/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login_s.css
mufgpxpwf.tokyo/css/ |
104 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
mufgpxpwf.tokyo/js/im/ |
91 KB 32 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
mufgpxpwf.tokyo/js/im/ |
284 KB 92 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.min.css
cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_mufg.svg
mufgpxpwf.tokyo/sigin/ |
11 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_help.svg
mufgpxpwf.tokyo/sigin/ |
1 KB 722 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_help_g.svg
mufgpxpwf.tokyo/sigin/ |
2 KB 794 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_lostpw.svg
mufgpxpwf.tokyo/sigin/ |
1 KB 624 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_beginner.svg
mufgpxpwf.tokyo/sigin/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img_cashcard@2x.png
mufgpxpwf.tokyo/sigin/ |
262 B 262 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.gif
mufgpxpwf.tokyo/sigin/ |
262 B 262 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
mufgpxpwf.tokyo/js/im/css/modules/laydate/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
mufgpxpwf.tokyo/js/im/css/modules/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_1.html
mufgpxpwf.tokyo/sigin/ Frame 5229 |
262 B 311 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_openwindow.svg
mufgpxpwf.tokyo/css/ |
262 B 262 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_arrow_right_w.svg
mufgpxpwf.tokyo/css/ |
262 B 262 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_openlist.svg
mufgpxpwf.tokyo/css/ |
262 B 262 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_arrow_right.svg
mufgpxpwf.tokyo/css/ |
262 B 262 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_pcsite.svg
mufgpxpwf.tokyo/css/ |
262 B 262 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_chat_filled.svg
mufgpxpwf.tokyo/css/ |
262 B 262 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
mufgpxpwf.tokyo/ |
5 KB 5 KB |
Other
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MUFG (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 undefined| event object| fence object| sharedStorage function| $ function| jQuery object| bootstrap object| layui function| lay number| errors object| layer object| jQuery1101015248574073142218 object| timer function| is_opt function| verify1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mufgpxpwf.tokyo/ | Name: PHPSESSID Value: gkf6upbacse4ntvmebc86qfr72 |
11 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.bootcdn.net
mufgpxpwf.tokyo
193.143.1.205
2606:4700:3110::6812:33de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