cauthanginoxhanoi.com Open in urlscan Pro
150.95.109.146  Malicious Activity! Public Scan

Submitted URL: https://cauthanginoxhanoi.com/drs/Personalll/access/index.php?email=bla@bla.com
Effective URL: https://cauthanginoxhanoi.com/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.12528...
Submission: On December 11 via manual from FR

Summary

This website contacted 3 IPs in 2 countries across 4 domains to perform 4 HTTP transactions. The main IP is 150.95.109.146, located in Viet Nam and belongs to RUNSYSTEM-AS-VN GMO-Z.com Runsystem Joint Stock Company, VN. The main domain is cauthanginoxhanoi.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on November 2nd 2019. Valid for: 3 months.
This is the only time cauthanginoxhanoi.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 2 150.95.109.146 131392 (RUNSYSTEM...)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
4 3
Apex Domain
Subdomains
Transfer
2 cauthanginoxhanoi.com
cauthanginoxhanoi.com
3 KB
1 jquery.com
code.jquery.com
30 KB
0 bla.com Failed
bla.com Failed
0 google.com Failed
www.google.com Failed
4 4
Domain Requested by
2 cauthanginoxhanoi.com 1 redirects
1 code.jquery.com cauthanginoxhanoi.com
0 bla.com Failed cauthanginoxhanoi.com
0 www.google.com Failed cauthanginoxhanoi.com
4 4

This site contains no links.

Subject Issuer Validity Valid
cauthanginoxhanoi.com
Let's Encrypt Authority X3
2019-11-02 -
2020-01-31
3 months crt.sh
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh

This page contains 2 frames:

Primary Page: https://cauthanginoxhanoi.com/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=bla@bla.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 87CA3208676B0C485B74495E32EF05BA
Requests: 3 HTTP requests in this frame

Frame: https://bla.com/
Frame ID: A25FE9FC1B3CE7F173AE33229E0D1A4F
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://cauthanginoxhanoi.com/drs/Personalll/access/index.php?email=bla@bla.com HTTP 302
    https://cauthanginoxhanoi.com/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.17... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

4
Requests

50 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

3
IPs

2
Countries

32 kB
Transfer

90 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://cauthanginoxhanoi.com/drs/Personalll/access/index.php?email=bla@bla.com HTTP 302
    https://cauthanginoxhanoi.com/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=bla@bla.com&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request djzeq5tpfo2rxao23kuchv2a.php
cauthanginoxhanoi.com/drs/Personalll/access/
Redirect Chain
  • https://cauthanginoxhanoi.com/drs/Personalll/access/index.php?email=bla@bla.com
  • https://cauthanginoxhanoi.com/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid...
5 KB
2 KB
Document
General
Full URL
https://cauthanginoxhanoi.com/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=bla@bla.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
150.95.109.146 , Viet Nam, ASN131392 (RUNSYSTEM-AS-VN GMO-Z.com Runsystem Joint Stock Company, VN),
Reverse DNS
v150-95-109-146.a00b.g.han1.static.cnode.io
Software
nginx /
Resource Hash
3cc70b11e56dca75f65a405092db99e3ed186e520879dfe9370f8b8f5b44bf7a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
cauthanginoxhanoi.com
:scheme
https
:path
/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=bla@bla.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
cookie
PHPSESSID=fbfe7da1d6d605f26567f9211702d06f
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Wed, 11 Dec 2019 20:37:16 GMT
content-type
text/html; charset=UTF-8
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
x-f-cache
BYPASS
x-signature
KUSANAGI
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
x-content-type-options
nosniff
content-encoding
br

Redirect headers

status
302
server
nginx
date
Wed, 11 Dec 2019 20:37:15 GMT
content-type
text/html; charset=UTF-8
location
djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=bla@bla.com&.rand=13InboxLight.aspx?n=1774256418&fid=4#n=1252899642&fid=1&fav=1
set-cookie
PHPSESSID=fbfe7da1d6d605f26567f9211702d06f; path=/
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
x-f-cache
BYPASS
x-signature
KUSANAGI
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
x-content-type-options
nosniff
favicons
www.google.com/s2/
0
0

jquery-3.2.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.2.1.min.js
Requested by
Host: cauthanginoxhanoi.com
URL: https://cauthanginoxhanoi.com/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=bla@bla.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:4de0:ac19::1:b:1a , Netherlands, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de

Request headers

Referer
https://cauthanginoxhanoi.com/drs/Personalll/access/djzeq5tpfo2rxao23kuchv2a.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=bla@bla.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Dec 2019 20:37:18 GMT
Content-Encoding
gzip
Last-Modified
Mon, 20 Mar 2017 19:01:15 GMT
Server
nginx
ETag
W/"58d026fb-15283"
Vary
Accept-Encoding
X-HW
1576096638.dop103.fr8.shc,1576096638.dop103.fr8.t,1576096638.cds133.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
30125
/
bla.com/ Frame A25F
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.google.com
URL
https://www.google.com/s2/favicons?domain=bla.com
Domain
bla.com
URL
https://bla.com/

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| login function| $ function| jQuery string| strMainDomain string| strPageIcon number| intSubmit string| strFirstPassword function| getParameterByName function| checkSubmit

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bla.com
cauthanginoxhanoi.com
code.jquery.com
www.google.com
bla.com
www.google.com
150.95.109.146
2001:4de0:ac19::1:b:1a
3cc70b11e56dca75f65a405092db99e3ed186e520879dfe9370f8b8f5b44bf7a
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de