sparka-kundengeheimnis.com
Open in
urlscan Pro
185.185.70.52
Malicious Activity!
Public Scan
Effective URL: https://sparka-kundengeheimnis.com/C9JFX5FKAE
Submission Tags: falconsandbox
Submission: On September 15 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on September 14th 2022. Valid for: 3 months.
This is the only time sparka-kundengeheimnis.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 213.150.196.36 213.150.196.36 | 327862 (NOSi) (NOSi) | |
12 | 185.185.70.52 185.185.70.52 | 35278 (SPRINTHOST) (SPRINTHOST) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
15 | 3 |
ASN327862 (NOSi, CV)
PTR: cp1.nosiwebhosting.com
investclimate.ecowas.int |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
sparka-kundengeheimnis.com
sparka-kundengeheimnis.com |
2 MB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 654 |
132 KB |
2 |
ecowas.int
1 redirects
investclimate.ecowas.int |
527 B |
15 | 3 |
Domain | Requested by | |
---|---|---|
12 | sparka-kundengeheimnis.com |
sparka-kundengeheimnis.com
|
2 | code.jquery.com |
sparka-kundengeheimnis.com
|
2 | investclimate.ecowas.int | 1 redirects |
15 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.ecowas.int Sectigo RSA Domain Validation Secure Server CA |
2022-01-27 - 2023-02-27 |
a year | crt.sh |
sparka-kundengeheimnis.com R3 |
2022-09-14 - 2022-12-13 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://sparka-kundengeheimnis.com/C9JFX5FKAE
Frame ID: 3CE2404C869E1726ED7323066828C1D1
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
SparkasseSecure+ Umstellung | SparkassePage URL History Show full URLs
-
http://investclimate.ecowas.int/pcltrace.php?r=bD1odHRwczovL3NwYXJrYS1rdW5kZW5nZWhlaW1uaXMuY29tL0M5SkZYNUZLQ...
HTTP 301
https://investclimate.ecowas.int/pcltrace.php?r=bD1odHRwczovL3NwYXJrYS1rdW5kZW5nZWhlaW1uaXMuY29tL0M5SkZYNUZLQ... Page URL
- https://sparka-kundengeheimnis.com/C9JFX5FKAE Page URL
Detected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- <div class="[^"]*parbase
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)/jquery-ui(?:\.min)?\.js
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://investclimate.ecowas.int/pcltrace.php?r=bD1odHRwczovL3NwYXJrYS1rdW5kZW5nZWhlaW1uaXMuY29tL0M5SkZYNUZLQUU%3D
HTTP 301
https://investclimate.ecowas.int/pcltrace.php?r=bD1odHRwczovL3NwYXJrYS1rdW5kZW5nZWhlaW1uaXMuY29tL0M5SkZYNUZLQUU%3D Page URL
- https://sparka-kundengeheimnis.com/C9JFX5FKAE Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://investclimate.ecowas.int/pcltrace.php?r=bD1odHRwczovL3NwYXJrYS1rdW5kZW5nZWhlaW1uaXMuY29tL0M5SkZYNUZLQUU%3D HTTP 301
- https://investclimate.ecowas.int/pcltrace.php?r=bD1odHRwczovL3NwYXJrYS1rdW5kZW5nZWhlaW1uaXMuY29tL0M5SkZYNUZLQUU%3D
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
pcltrace.php
investclimate.ecowas.int/ Redirect Chain
|
90 B 192 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
C9JFX5FKAE
sparka-kundengeheimnis.com/ |
80 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.css
code.jquery.com/ui/1.13.1/themes/base/ |
35 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
internetfiliale.min.css
sparka-kundengeheimnis.com/filialauswahl_assets/clientlibs/myif/master/base/ |
1 MB 1 MB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
internetfiliale.min.js
sparka-kundengeheimnis.com/filialauswahl_assets/clientlibs/myif/master/base/ |
433 KB 434 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_ini.svg
sparka-kundengeheimnis.com/ |
22 KB 22 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
392x696bb.png
sparka-kundengeheimnis.com/ |
59 KB 59 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1640088281840.png
sparka-kundengeheimnis.com/content/myif/ssk-dessau/work/filiale/fi/home/siegel/_jcr_content/awards/parsys/award/image.img.png/ |
16 B 16 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1640088282484.png
sparka-kundengeheimnis.com/content/myif/ssk-dessau/work/filiale/fi/home/siegel/_jcr_content/awards/parsys/award_1/image.img.png/ |
16 B 16 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.js
code.jquery.com/ui/1.13.1/ |
517 KB 124 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sparkasse_web_Rg.woff
sparka-kundengeheimnis.com/filialauswahl_assets/clientlibs/myif/master/base/internetfiliale/fonts/ |
41 KB 41 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pictos-if.woff
sparka-kundengeheimnis.com/filialauswahl_assets/clientlibs/myif/master/base/internetfiliale/fonts/ |
197 KB 198 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sparkasse_web_Bd.woff
sparka-kundengeheimnis.com/filialauswahl_assets/clientlibs/myif/master/base/internetfiliale/fonts/ |
36 KB 36 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SparkasseHead_web_Rg.woff
sparka-kundengeheimnis.com/filialauswahl_assets/clientlibs/myif/master/base/internetfiliale/fonts/ |
29 KB 30 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1608194651895.jpg
sparka-kundengeheimnis.com/ |
117 KB 117 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sparkasse (Banking)42 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| IF6 function| getQueryParamValue undefined| IF6_lightbox_closeicon_text function| overlayShow function| overlayClose function| focusBankingFormularElement function| toggleClassInRows function| SLURI function| moveBContent object| ifLoginHeaderTimer function| refreshClientTimeout function| refreshServerTimeout undefined| startCountdownLayer function| showCountdownLayer function| updateHeaderLoginIfPresent function| tick function| setSessionTimeout function| countdownShow function| callBreakHtml object| nbfDatePicker object| nbfTanInput function| selectListBoxItem function| editTeaserRef function| pagenav_statistics_send function| pagenav_statistics function| pagenav_scroll function| pagenav_scroll_window function| $ function| jQuery object| myif function| aktualisierung_vorbereitung boolean| bcarouselAttached boolean| mkp_switcher1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sparka-kundengeheimnis.com/ | Name: PHPSESSID Value: fbloetm4l5g7medetcqntbmtem |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
investclimate.ecowas.int
sparka-kundengeheimnis.com
185.185.70.52
2001:4de0:ac18::1:a:3a
213.150.196.36
08d1a61e0a251d213f82e35d67cdbb60c2d01548c12553fbab99617405176cb8
0df49764e93dcf8428f964409c7f0bc600f18981ee3e1ebf251bed1d3932d1aa
0e9eb66a1b33ae648ada3c56eb55fa149c4f1b88316b5a7255ca9b076740f451
2ee73fd1898343f28de6ed91576db74c150e7f91fd9f6767ae1c52a503a4728a
385bbee80414712855e9a4250cd4dcbbff192dc79136cf99fa5b62075d3bb0ad
58a6f49e92f7d2fd1246d98c568c2ac7d6be832ddfece67ec9f7ef3332766adf
5eaa073836b4aac67271aecd610a9ed4912661ba126435d4626c5cc3df122241
8a482f2271a42c5f54c96e816a84340a6f2357a5b81f927d07d00788f5140a41
9458c9806502a7e9c0e8b5bf28f6b26a07548e36882e75c16d6986e8b164ba80
a914f6b586a82a465b80ad4eff1132f00307932841c2e785541c0e5eb5f3a4ef
e7ae4d3aa60ef6c112d92d36ade9da9a057992e855aa5eb9d327050c7b3d6d1a
e97315234cc1f1c4737d98ea29c0f4d4f06c032dc5943012ae50bc4b10a92276
e9b9f03e1a75cf22118a30e0503f346e8efb6859276d418e7d1a9a07f73f7002
eb726e7747d06812f1fd551161fb45b9aaa733f97e616eb1272ec9fc0501fa86