Analysis Report http://www.947947.mirramodaintima.com.br/#aHR0cHM6Ly9lbXl0dXJrLmNvbS9zZC9JSy9vZjEvRmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t

Overview

General Information

Sample URL: http://www.947947.mirramodaintima.com.br/#aHR0cHM6Ly9lbXl0dXJrLmNvbS9zZC9JSy9vZjEvRmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t
Analysis ID: 321316

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish_10
Yara detected HtmlPhish_3
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clh Avira URL Cloud: Label: phishing
Source: https://emyturk.com/sd/IK/of1/images/favicon.ico~ Avira URL Cloud: Label: phishing

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish_10
Source: Yara match File source: 494126.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d[1].htm, type: DROPPED
Yara detected HtmlPhish_3
Source: Yara match File source: 494126.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d[1].htm, type: DROPPED
Phishing site detected (based on image similarity)
Source: https://emyturk.com/sd/IK/of1/images/inv-big-background.jpg Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Phishing site detected (based on logo template match)
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t HTTP Parser: Number of links: 0
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t HTTP Parser: Title: verify your login does not match URL
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t HTTP Parser: Title: verify your login does not match URL
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t HTTP Parser: No <meta name="author".. found
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t HTTP Parser: No <meta name="author".. found
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t HTTP Parser: No <meta name="copyright".. found
Source: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t HTTP Parser: No <meta name="copyright".. found
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 20 Nov 2020 19:34:04 GMTServer: ApacheVary: Accept-EncodingX-Mod-Pagespeed: 1.13.35.2-0Content-Encoding: gzipCache-Control: max-age=0, no-cache, s-maxage=10Content-Length: 348Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 7d 52 cb 6e 83 30 10 bc 47 ca 3f a0 f4 60 a3 38 01 d2 34 2a 32 e6 0b 7a a8 2a 55 3d 20 14 b9 d8 14 57 14 10 38 8f 2a e2 df bb 4e 1c 42 2e f5 01 0d b3 33 3b f6 6a a7 93 a8 d0 3f 65 ec 4c 01 48 2e 0c 70 e0 44 5a e9 52 c6 af a5 e4 9d 74 3e b8 d2 cb e5 32 f2 2e ac 11 77 59 ab 1a ed e8 df 46 b2 99 96 47 ed 7d f3 3d bf b0 b3 78 cf 5b 67 eb 1f 05 17 01 4b d0 b6 93 65 8e 08 2a eb 8c 6b 55 57 00 0b de 15 28 a5 38 df 55 99 a1 30 a8 c3 f0 39 94 6b 62 7d 5c b8 27 db 66 15 08 9f 73 36 d6 06 9b cd 5a e6 ee e9 50 a8 52 e2 c5 62 44 0d 9d 12 d4 ec 4c 0a 1e 31 5d a1 72 0d 94 eb d2 be a7 43 6f 3c 9f df 62 69 8f ed 0f 81 ae 61 06 da d1 45 d8 ff 57 1e 48 36 a0 85 7f f4 e9 fd 53 ac 21 19 34 29 6d a5 de b5 d5 4d 43 fb ab e7 29 7b cc 73 9f d9 0a 31 a3 63 07 55 89 fa 90 0c 55 8c 20 04 b9 e9 3d 13 00 43 be a4 3e 5b cc 07 06 d0 94 ca 0c 00 3d 20 37 01 45 4a 84 cc 6a 21 c5 59 c3 75 fd 89 ad c1 25 ef 6f 2f 6c 54 a5 36 14 d5 8d ac a0 05 94 c9 5d dc 0a c1 a8 22 ef b2 04 f1 74 02 6b e2 5d 97 0a 90 d9 b3 3f 2d 2e 9d e6 70 02 00 00 Data Ascii: }Rn0G?`84*2z*U= W8*NB.3;j?eLH.pDZRt>2.wYFG}=x[gKe*kUW(8U09kb}\'fs6ZPRbDL1]rCo<biaEWH6S!4)mMC){s1cUU =C>[= 7EJj!Yu%o/lT6]"tk]?-.p
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: www.947947.mirramodaintima.com.brConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: www.947947.mirramodaintima.com.br
Source: ~DF6F91C063D2F30E5E.TMP.1.dr, {C7E6D3E7-2BB2-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: http://www.947947.mirramodaintima.com.br/#aHR0cHM6Ly9lbXl0dXJrLmNvbS9zZC9JSy9vZjEvRmlkZWwuVG9ycmVzQH
Source: ~DF6F91C063D2F30E5E.TMP.1.dr String found in binary or memory: https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clh
Source: imagestore.dat.2.dr String found in binary or memory: https://emyturk.com/sd/IK/of1/images/favicon.ico~
Source: {C7E6D3E7-2BB2-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://emyturk.com/sdamodaintima.com.br/#aHR0cHM6Ly9lbXl0dXJrLmNvbS9zZC9JSy9vZjEvRmlkZWwuVG9ycmVzQH
Source: h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d[1].htm.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v16/mem5YaGs126MiZpBA-UN_r8OUuhs.ttf)
Source: h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d[1].htm.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v16/mem5YaGs126MiZpBA-UNirkOUuhs.ttf)
Source: h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d[1].htm.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v16/mem8YaGs126MiZpBA-UFVZ0e.ttf)
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: classification engine Classification label: mal80.phis.win@3/21@3/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF9F29FA5FDEA9E3EC.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3544 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3544 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 321316 URL: http://www.947947.mirramoda... Startdate: 20/11/2020 Architecture: WINDOWS Score: 80 15 emyturk.com 2->15 21 Antivirus detection for URL or domain 2->21 23 Phishing site detected (based on favicon image match) 2->23 25 Yara detected HtmlPhish_10 2->25 27 3 other signatures 2->27 7 iexplore.exe 2 61 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 49 7->9         started        dnsIp6 17 www.947947.mirramodaintima.com.br 177.234.159.42, 49715, 49716, 80 DIMENOCUS Brazil 9->17 19 emyturk.com 45.139.223.28, 443, 49717, 49718 BURSABILTR Turkey 9->19 13 h6fxekgnyj1ct4qu07...yf4ngqwizk2d[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
177.234.159.42
unknown Brazil
33182 DIMENOCUS false
45.139.223.28
unknown Turkey
60721 BURSABILTR false

Contacted Domains

Name IP Active
emyturk.com 45.139.223.28 true
www.947947.mirramodaintima.com.br 177.234.159.42 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://emyturk.com/sd/IK/of1/h6fxekgnyj1ct4qu07dzlio5mv2sr3b8wa9pexjkg9qi1n07zu5m4t8b2fr3dyoswa6clhpvuh5b3l6pcaeor1sx98j0vmt7yf4ngqwizk2d?data=RmlkZWwuVG9ycmVzQHNlYXJzaGMuY29t true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown
http://www.947947.mirramodaintima.com.br/ false
  • Avira URL Cloud: safe
unknown