This is the email:
the link is an ow[.]ly redirect to sm-mebel[.]com which then redirects you to the final domain: accesspoint-cnt-ce22.cjonline[.]org
Inspecting the contents of root of the fsecond domain shows that this indeed is a russian developed website that was probably hijacked for this phishing campaign:
If we grab the full url:
and inspect it, we find that this landing page, after clicking the link on the email, shows a a wellsfargo(cheeky) loading animation and then redirects you to the final malicious page using <meta http-equiv="refresh" content="..." to send you there.
This is what it looked like:
And here is where you finally land:
Here is the urlscan results of the page:
Now, in order to successfully request the html code of the page in bash, I had to set two cookies, "phpsessid" and "_cf_bm" with the curl command options. I used the cookies created in the urlscan detonation:
The command:
Without the two headers, the request would result in a 403 forbidden.
And finally I hit a road block with bash-only-based investigation, the dreaded javascript:
I cannot go any further unless i use more sophisticated techniques.