cr67680.tmweb.ru
Open in
urlscan Pro
2a03:6f00:6:1::517:3284
Malicious Activity!
Public Scan
Submission: On April 07 via automatic, source openphish — Scanned from DE
Summary
This is the only time cr67680.tmweb.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banque Postale (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 2a03:6f00:6:1... 2a03:6f00:6:1::517:3284 | 9123 (TIMEWEB-AS) (TIMEWEB-AS) | |
15 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
tmweb.ru
cr67680.tmweb.ru |
173 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | cr67680.tmweb.ru |
cr67680.tmweb.ru
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/index.php
Frame ID: 9B4A972740248D425F2990D1CA039B94
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
La Banque Postale - Service ClientDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/ |
11 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sms.css
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/ |
2 KB 721 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/ |
46 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.4.1.min.js
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/ |
86 KB 30 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wb.validation.min.js
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/ |
5 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-lbp.png
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Capssture.PNG
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/images/ |
161 B 470 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img0001.png
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/images/ |
520 B 830 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
user1.png
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Captssure.PNG
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/images/ |
251 B 560 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
black-circle-icon_facebook1-940x940.png
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/images/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
TWITTER_icon-icons.com_62686.png
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/images/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
646-6466650_png-file-black-youtube-icon-png.png
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/images/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
cr67680.tmweb.ru/my-account-337484/loadingg/cc/loadingg/sms/ |
75 KB 76 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banque Postale (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cr67680.tmweb.ru
2a03:6f00:6:1::517:3284
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
1f3b401cf71cdfe8a8b1632749f10200b75e93862f08a0c32bf6028a7099ed3a
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
2dc362bfa04b869e8f196176620f482c0f010527ab1462ce9f87f70aedff4d44
3711fc93d7d3a1b2fbec092c34d2400c7d73f4225cfafad0cc76811a532cee93
3c3516a93356d4b4999a2181742742a6f8205c0e196d6cc39fca77b845358743
55f548bad4108fe721e946d3e1f0d240140530d48aa80b9c6f8559c7f2c9470f
5f3a3b79787d6827e01289f2bedd3b6d7a6ce22312f75670f7f828a4cc14348c
6c2ecc8d8ed497ccfd5de46495d86ec26eb29234a7b65a48cb3bb60ea1519a0a
7fdf450ff9f86c928970d231d6a3c4946ef8a84ce510798d9c2c78ccd3c185c2
a0eb466a5d755216fbe5a08127361690c1ff954a2396379bfd29f832bdc54a90
aaab296180456b9fef1f4051100a1cc467d2ab8cfa4226041991c8bee7476552
f738e43420cef3f06f88dea0c22c78eff04a911831598f8535cb12aa47371090
f7891ddc5fb6b0273c9345043196a805252f019da26ee9f4d49ec1a9905180c5
fbd54fe0126992ee307b2a294032de87ce793946bab8aee48432188bc754f97b