"Coinbase Verification" Phishing Email Analysis

This is the email:

the link is an ow[.]ly redirect to sm-mebel[.]com which then redirects you to the final domain: accesspoint-cnt-ce22.cjonline[.]org

Inspecting the contents of root of the fsecond domain shows that this indeed is a russian developed website that was probably hijacked for this phishing campaign:

 

If we grab the full url:

and inspect it, we find that this landing page, after clicking the link on the email, shows a a wellsfargo(cheeky) loading animation and then redirects you to the final malicious page using <meta http-equiv="refresh" content="..." to send you there.

This is what it looked like:

And here is where you finally land:

Here is the urlscan results of the page:

Now, in order to successfully request the html code of the page in bash, I had to set two cookies, "phpsessid" and "_cf_bm" with the curl command options. I used the cookies created in the urlscan detonation:

The command:

Without the two headers, the request would result in a 403 forbidden.

And finally I hit a road block with bash-only-based investigation, the dreaded javascript:

I cannot go any further unless i use more sophisticated techniques.