phishoom.dynsim.net Open in urlscan Pro
95.154.252.243  Malicious Activity! Public Scan

Submitted URL: https://api.dynarisk.net/phishing-sim/api/v1/campaign/phishing/86cff97c-f696-4561-90db-27a53e757727/statistic/track/click...
Effective URL: https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed...
Submission: On November 16 via manual from US

Summary

This website contacted 2 IPs in 3 countries across 3 domains to perform 4 HTTP transactions. The main IP is 95.154.252.243, located in United Kingdom and belongs to IOMART-AS, GB. The main domain is phishoom.dynsim.net.
TLS certificate: Issued by Let's Encrypt Authority X3 on September 27th 2020. Valid for: 3 months.
This is the only time phishoom.dynsim.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Dropbox (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 1 54.171.40.62 16509 (AMAZON-02)
3 95.154.252.243 20860 (IOMART-AS)
1 2a00:1450:400... 15169 (GOOGLE)
4 2
Apex Domain
Subdomains
Transfer
3 dynsim.net
phishoom.dynsim.net
82 KB
1 googleapis.com
ajax.googleapis.com
29 KB
1 dynarisk.net
api.dynarisk.net
742 B
4 3
Domain Requested by
3 phishoom.dynsim.net phishoom.dynsim.net
1 ajax.googleapis.com phishoom.dynsim.net
1 api.dynarisk.net 1 redirects
4 3

This site contains no links.

Subject Issuer Validity Valid
phishoom.dynsim.net
Let's Encrypt Authority X3
2020-09-27 -
2020-12-26
3 months crt.sh
upload.video.google.com
GTS CA 1O1
2020-10-28 -
2021-01-20
3 months crt.sh

This page contains 1 frames:

Primary Page: https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b
Frame ID: 85690CC0EED277D4B27D2F35560B6773
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://api.dynarisk.net/phishing-sim/api/v1/campaign/phishing/86cff97c-f696-4561-90db-27a53e757727/s... HTTP 301
    https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uu... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

4
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

2
IPs

3
Countries

111 kB
Transfer

164 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://api.dynarisk.net/phishing-sim/api/v1/campaign/phishing/86cff97c-f696-4561-90db-27a53e757727/statistic/track/click?track[user_uuid]=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&track[user_email_template_uuid]=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b&track[redirect_url]=https%3A%2F%2Fphishoom.dynsim.net%2Fdrpbx-en-gb%2F%3Fuser_campaign_uuid%3D86cff97c-f696-4561-90db-27a53e757727%26user_uuid%3D02952d97-c2cc-4ed3-b1b2-47b7641a6b11%26user_email_template_uuid%3D1c2e2ac4-cf50-4272-a68d-045bd6d6d78b HTTP 301
    https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
phishoom.dynsim.net/drpbx-en-gb/
Redirect Chain
  • https://api.dynarisk.net/phishing-sim/api/v1/campaign/phishing/86cff97c-f696-4561-90db-27a53e757727/statistic/track/click?track[user_uuid]=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&track[user_email_temp...
  • https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045b...
6 KB
7 KB
Document
General
Full URL
https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
95.154.252.243 , United Kingdom, ASN20860 (IOMART-AS, GB),
Reverse DNS
Software
nginx/1.15.12 / PHP/7.4.8
Resource Hash
9b40a0c54cffeab4130165f188a54f4fb3253eee6dac29843506c150e656144d

Request headers

Host
phishoom.dynsim.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
nginx/1.15.12
Date
Mon, 16 Nov 2020 08:14:30 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
X-Powered-By
PHP/7.4.8

Redirect headers

Access-Control-Allow-Headers
X-Requested-With, X-Requested-App-Version, X-Requested-App-Build, Content-Type, Accept, Origin, Authorization, Content-Language, Language
Access-Control-Allow-Methods
GET, POST, PUT, DELETE, PATCH, OPTIONS
Access-Control-Allow-Origin
*
Access-Control-Max-Age
1728000
Content-Type
text/html; charset=UTF-8
Date
Mon, 16 Nov 2020 08:14:30 GMT
Location
https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b
Server
nginx
X-Request-ID
8d490abe-e678-b9fc-6556-28839de4d1f8
Content-Length
0
Connection
keep-alive
style.css
phishoom.dynsim.net/drpbx-en-gb/
8 KB
8 KB
Stylesheet
General
Full URL
https://phishoom.dynsim.net/drpbx-en-gb/style.css
Requested by
Host: phishoom.dynsim.net
URL: https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
95.154.252.243 , United Kingdom, ASN20860 (IOMART-AS, GB),
Reverse DNS
Software
nginx/1.15.12 /
Resource Hash
60a3fc445592625385b5dd3dcba95372c4b84314027e9443260a1d03efa358a2

Request headers

Referer
https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 16 Nov 2020 08:14:30 GMT
Last-Modified
Mon, 27 Jul 2020 08:30:21 GMT
Server
nginx/1.15.12
ETag
"5f1e909d-1fcf"
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
8143
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.3/
82 KB
29 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/2.1.3/jquery.min.js
Requested by
Host: phishoom.dynsim.net
URL: https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8af93bd675e1cfd9ecc850e862819fdac6e3ad1f5d761f970e409c7d9c63bdc3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://phishoom.dynsim.net/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 10 Nov 2020 13:26:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
499668
status
200
cross-origin-resource-policy
cross-origin
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29707
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 19:15:00 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 10 Nov 2021 13:26:42 GMT
dropbox.png
phishoom.dynsim.net/drpbx-en-gb/images/
67 KB
68 KB
Image
General
Full URL
https://phishoom.dynsim.net/drpbx-en-gb/images/dropbox.png
Requested by
Host: phishoom.dynsim.net
URL: https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
95.154.252.243 , United Kingdom, ASN20860 (IOMART-AS, GB),
Reverse DNS
Software
nginx/1.15.12 /
Resource Hash
f486dd244f3bae8a006758b411a1b19799d4b23aff2c360ec7b7b72c187deaa3

Request headers

Referer
https://phishoom.dynsim.net/drpbx-en-gb/?user_campaign_uuid=86cff97c-f696-4561-90db-27a53e757727&user_uuid=02952d97-c2cc-4ed3-b1b2-47b7641a6b11&user_email_template_uuid=1c2e2ac4-cf50-4272-a68d-045bd6d6d78b
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 16 Nov 2020 08:14:30 GMT
Last-Modified
Mon, 27 Jul 2020 08:30:21 GMT
Server
nginx/1.15.12
ETag
"5f1e909d-10d3f"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
68927

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Dropbox (Consumer)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery

0 Cookies