URL: http://am-t.by/library/2016/cache/aze/index/?email=abuse@asrt&fav.1=&fid=1&fid.1=&fid.125289964...
Submission: On February 18 via automatic, source phishtank

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 93.125.99.42, located in Minsk, Belarus and belongs to BELPAK-AS BELPAK, BY. The main domain is am-t.by.
This is the only time am-t.by was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Excel / PDF download (Online)

Domain & IP information

IP Address AS Autonomous System
1 3 93.125.99.42 6697 (BELPAK-AS...)
2 2
Apex Domain
Subdomains
Transfer
3 am-t.by
am-t.by
72 KB
2 1
Domain Requested by
3 am-t.by 1 redirects am-t.by
2 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://am-t.by/library/2016/cache/aze/index/?email=abuse@asrt&fav.1=&fid=1&fid.1=&fid.1252899642=&fid.4.1252899642=&rand=13inboxlightaspxn.1774256418&rand.13inboxlight.aspxn.1774256418=
Frame ID: (E6D2F6B5E72DDA214B21EAC9EEDD5546)
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

71 kB
Transfer

162 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • http://am-t.by/library/2016/cache/aze/index/files/294.gif HTTP 302
  • http://am-t.by/error-page.html

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
am-t.by/library/2016/cache/aze/index/
83 KB
53 KB
Document
General
Full URL
http://am-t.by/library/2016/cache/aze/index/?email=abuse@asrt&fav.1=&fid=1&fid.1=&fid.1252899642=&fid.4.1252899642=&rand=13inboxlightaspxn.1774256418&rand.13inboxlight.aspxn.1774256418=
Protocol
HTTP/1.1
Server
93.125.99.42 Minsk, Belarus, ASN6697 (BELPAK-AS BELPAK, BY),
Reverse DNS
vh62.hosterby.com
Software
nginx/1.12.1 / PHP/5.3.28
Resource Hash
cd8714bdc7566bb8372e6c9c7543442f234c3a9e40893d24941a5fdd0c3ab419

Request headers

Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Connection
keep-alive
Accept-Encoding
gzip, deflate
Host
am-t.by
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Sun, 18 Feb 2018 08:53:19 GMT
Content-Encoding
gzip
Server
nginx/1.12.1
X-Powered-By
PHP/5.3.28
Vary
Accept-Encoding,User-Agent
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
truncated
/
49 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2202d40e45d69a4efd1f5fc6c8d603d3e849cdcdd39460029589b9119a2949d9

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
12 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7ad3cfa7242cbdc3b8f9126dbf8273043417c2581f11c95385dc46cc80702798

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
Cookie set error-page.html
am-t.by/
Redirect Chain
  • http://am-t.by/library/2016/cache/aze/index/files/294.gif
  • http://am-t.by/error-page.html
18 KB
18 KB
Image
General
Full URL
http://am-t.by/error-page.html
Requested by
Host: am-t.by
URL: http://am-t.by/library/2016/cache/aze/index/?email=abuse@asrt&fav.1=&fid=1&fid.1=&fid.1252899642=&fid.4.1252899642=&rand=13inboxlightaspxn.1774256418&rand.13inboxlight.aspxn.1774256418=
Protocol
HTTP/1.1
Server
93.125.99.42 Minsk, Belarus, ASN6697 (BELPAK-AS BELPAK, BY),
Reverse DNS
vh62.hosterby.com
Software
nginx/1.12.1 / PHP/5.3.28
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
am-t.by
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://am-t.by/library/2016/cache/aze/index/?email=abuse@asrt&fav.1=&fid=1&fid.1=&fid.1252899642=&fid.4.1252899642=&rand=13inboxlightaspxn.1774256418&rand.13inboxlight.aspxn.1774256418=
Cookie
PHPSESSID=0ccb3b4c59efda912f59934c626974d4
Connection
keep-alive
Cache-Control
no-cache
Referer
http://am-t.by/library/2016/cache/aze/index/?email=abuse@asrt&fav.1=&fid=1&fid.1=&fid.1252899642=&fid.4.1252899642=&rand=13inboxlightaspxn.1774256418&rand.13inboxlight.aspxn.1774256418=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 18 Feb 2018 08:53:19 GMT
Content-Encoding
gzip
Server
nginx/1.12.1
X-Powered-By
PHP/5.3.28
Vary
Accept-Encoding,User-Agent
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Set-Cookie
skin=royalblue
Content-Length
3511
Expires
Thu, 19 Nov 1981 08:52:00 GMT

Redirect headers

Pragma
no-cache
Date
Sun, 18 Feb 2018 08:53:19 GMT
Content-Encoding
gzip
Server
nginx/1.12.1
X-Powered-By
PHP/5.3.28
Vary
Accept-Encoding,User-Agent
Connection
keep-alive
Content-Type
text/html
location
/error-page.html
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Set-Cookie
PHPSESSID=0ccb3b4c59efda912f59934c626974d4; path=/
Content-Length
58
Expires
Thu, 19 Nov 1981 08:52:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Excel / PDF download (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

2 Cookies

Domain/Path Name / Value
am-t.by/ Name: skin
Value: royalblue
am-t.by/ Name: PHPSESSID
Value: 0ccb3b4c59efda912f59934c626974d4