xzangoo.ru
Open in
urlscan Pro
2606:4700:3031::6815:3154
Malicious Activity!
Public Scan
Effective URL: https://xzangoo.ru/web/L-1666129700634f1f24de20b
Submission: On December 08 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by E1 on November 12th 2022. Valid for: 3 months.
This is the only time xzangoo.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 19 | 2606:4700:303... 2606:4700:3031::6815:3154 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
16 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
xzangoo.ru
3 redirects
xzangoo.ru |
274 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
19 | xzangoo.ru |
3 redirects
xzangoo.ru
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.xzangoo.ru E1 |
2022-11-12 - 2023-02-10 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://xzangoo.ru/web/L-1666129700634f1f24de20b
Frame ID: 3DDFB3F5445A3847477F028CA63AC65C
Requests: 13 HTTP requests in this frame
Frame:
https://xzangoo.ru/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1670515200
Frame ID: 07B06916AD982C5A5E25CC9A7DAB69C7
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
bce90a4f0e7f777a0cf2dc3a2b5670a650be80f9Page URL History Show full URLs
-
http://xzangoo.ru/web?__cf_chl_f_tk=0yomypawizz7qabvw.4ukx0shlynu4br_vvrtujhcgy-1669913945-0-g...
HTTP 301
https://xzangoo.ru/web?entity=60865 HTTP 301
https://xzangoo.ru/web/?entity=60865 HTTP 302
https://xzangoo.ru/web/L-1666129700634f1f24de20b Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://xzangoo.ru/web?__cf_chl_f_tk=0yomypawizz7qabvw.4ukx0shlynu4br_vvrtujhcgy-1669913945-0-ganycgzna2u&entity=60865
HTTP 301
https://xzangoo.ru/web?entity=60865 HTTP 301
https://xzangoo.ru/web/?entity=60865 HTTP 302
https://xzangoo.ru/web/L-1666129700634f1f24de20b Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
L-1666129700634f1f24de20b
xzangoo.ru/web/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
styles.css
xzangoo.ru/web/assets/css/ |
438 KB 64 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
xzangoo.ru/web/assets/js/ |
87 KB 32 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.mask.js
xzangoo.ru/web/assets/js/ |
9 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.inputmask.bundle.min.js
xzangoo.ru/web/assets/js/ |
116 KB 29 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
b_rgb.png
xzangoo.ru/web/assets/img/ |
38 KB 39 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
m_l.png
xzangoo.ru/web/assets/img/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Pc.js
xzangoo.ru/web/assets/js/ |
3 KB 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fsd-secure-esp-sprite.png
xzangoo.ru/web/assets/img/ |
473 B 995 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
help-qm-fsd.png
xzangoo.ru/web/assets/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
sign-in-sprite.png
xzangoo.ru/web/assets/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
gfootb-static-sprite.png
xzangoo.ru/web/assets/img/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
gfoot-home-icon.png
xzangoo.ru/web/assets/img/ |
144 B 663 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
invisible.js
xzangoo.ru/cdn-cgi/challenge-platform/h/b/scripts/alpha/ Frame 07B0 |
36 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pica.js
xzangoo.ru/cdn-cgi/challenge-platform/h/b/scripts/ Frame 07B0 |
20 KB 8 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
776755ff6c1690b8
xzangoo.ru/cdn-cgi/challenge-platform/h/b/cv/result/ Frame 07B0 |
2 B 667 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontentvisibilityautostatechange function| $ function| jQuery function| Inputmask function| cMsg function| getID function| hide function| domStyle function| userId function| checkPassword function| hasWhiteSpace function| onlyNumbers2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
xzangoo.ru/ | Name: PHPSESSID Value: 0iuif66mo65ud1redufsmehol8 |
|
.xzangoo.ru/ | Name: __cf_bm Value: BZOWU7R6Anii0iCKXVYwULtqpObkur1tC.WAT_BDj74-1670521749-0-AYISdSdKUCOQw6c+2v+iBam0GbWazY3w0o+bEO5wDyeMSQO/DqIETqDrq03ZuVJri0ab68SdKwbZD2R0sfPuB3amRJnCbAf8lKHNhoM0r9IvJXyEbByZoXxy6as/UdNT7wyprIAdEgBOQNWCymnOLM8= |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
xzangoo.ru
2606:4700:3031::6815:3154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