cuscatlan-sv-4340ab63c8ec.herokuapp.com
Open in
urlscan Pro
54.243.238.66
Malicious Activity!
Public Scan
Submission Tags: @phish_report
Submission: On November 06 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on March 2nd 2024. Valid for: a year.
This is the only time cuscatlan-sv-4340ab63c8ec.herokuapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Cuscatlan de El Salvador (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 54.243.238.66 54.243.238.66 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 216.58.212.170 216.58.212.170 | 15169 (GOOGLE) (GOOGLE) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 142.250.186.99 142.250.186.99 | 15169 (GOOGLE) (GOOGLE) | |
11 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-243-238-66.compute-1.amazonaws.com
cuscatlan-sv-4340ab63c8ec.herokuapp.com |
ASN15169 (GOOGLE, US)
PTR: fra24s01-in-f10.1e100.net
fonts.googleapis.com |
ASN15169 (GOOGLE, US)
PTR: fra24s06-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
herokuapp.com
cuscatlan-sv-4340ab63c8ec.herokuapp.com |
83 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 220 |
88 KB |
1 |
gstatic.com
fonts.gstatic.com |
19 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 30 |
1 KB |
11 | 4 |
Domain | Requested by | |
---|---|---|
7 | cuscatlan-sv-4340ab63c8ec.herokuapp.com |
cuscatlan-sv-4340ab63c8ec.herokuapp.com
|
2 | cdnjs.cloudflare.com |
cuscatlan-sv-4340ab63c8ec.herokuapp.com
cdnjs.cloudflare.com |
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
cuscatlan-sv-4340ab63c8ec.herokuapp.com
|
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.herokuapp.com Amazon RSA 2048 M02 |
2024-03-02 - 2025-03-31 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-10-07 - 2024-12-30 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-09-28 - 2024-12-27 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-10-07 - 2024-12-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cuscatlan-sv-4340ab63c8ec.herokuapp.com/index.html
Frame ID: 1F4CB7E08E5929BE42837668F9D65B1E
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
CuscaDetected technologies
Heroku (PaaS) ExpandDetected patterns
- \.herokuapp\.com
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
cuscatlan-sv-4340ab63c8ec.herokuapp.com/ |
4 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/css/ |
58 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
log.png
cuscatlan-sv-4340ab63c8ec.herokuapp.com/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arr.png
cuscatlan-sv-4340ab63c8ec.herokuapp.com/img/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
titulo.png
cuscatlan-sv-4340ab63c8ec.herokuapp.com/img/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
olv.png
cuscatlan-sv-4340ab63c8ec.herokuapp.com/img/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rela.jpg
cuscatlan-sv-4340ab63c8ec.herokuapp.com/img/ |
47 KB 47 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/webfonts/ |
76 KB 77 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
cuscatlan-sv-4340ab63c8ec.herokuapp.com/ |
196 B 890 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Cuscatlan de El Salvador (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
cuscatlan-sv-4340ab63c8ec.herokuapp.com
fonts.googleapis.com
fonts.gstatic.com
104.17.24.14
142.250.186.99
216.58.212.170
54.243.238.66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