gsamm.com
Open in
urlscan Pro
103.242.117.21
Malicious Activity!
Public Scan
Submission: On December 16 via automatic, source phishtank
Summary
This is the only time gsamm.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 103.242.117.21 103.242.117.21 | 132967 (OCEANEXPO...) (OCEANEXPORTS-AS OCEAN EXPORTS) | |
16 | 1 |
ASN132967 (OCEANEXPORTS-AS OCEAN EXPORTS, IN)
PTR: uniqueinfotech.net
gsamm.com |
Domain | Requested by | |
---|---|---|
16 | gsamm.com |
gsamm.com
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://gsamm.com/online-banking/Validation/step2.php?cmd=login_submit&id=521b4dd14952f64a5f6b9caa8b6f89d2521b4dd14952f64a5f6b9caa8b6f89d2&session=521b4dd14952f64a5f6b9caa8b6f89d2521b4dd14952f64a5f6b9caa8b6f89d2
Frame ID: (B9C5B9487666CD5DFF997D585D08F95A)
Requests: 16 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
step2.php
gsamm.com/online-banking/Validation/ |
10 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
gsamm.com/online-banking/Validation/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
gsamm.com/online-banking/Validation/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
gsamm.com/online-banking/Validation/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.png
gsamm.com/online-banking/Validation/images/ |
240 B 240 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
gsamm.com/online-banking/Validation/images/ |
273 B 273 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
imgnortonsiteseal.png
gsamm.com/online-banking/Validation/images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.png
gsamm.com/online-banking/Validation/images/ |
90 KB 90 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
11.png
gsamm.com/online-banking/Validation/images/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
20.png
gsamm.com/online-banking/Validation/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
22.png
gsamm.com/online-banking/Validation/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
21.png
gsamm.com/online-banking/Validation/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
23.png
gsamm.com/online-banking/Validation/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8.png
gsamm.com/online-banking/Validation/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9.png
gsamm.com/online-banking/Validation/images/ |
573 B 573 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
10.png
gsamm.com/online-banking/Validation/images/ |
592 B 592 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onafterprint object| onbeforeprint function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
gsamm.com
103.242.117.21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