puellabeauty.com
Open in
urlscan Pro
162.241.124.211
Malicious Activity!
Public Scan
Effective URL: https://puellabeauty.com/Up/nedbank/app/login.php?MTY1MDUzNDQzMWYyMzM4NjRmYzM1MmUwNGVmOGZiNWNhZTg1MWE1MjQ0ZWZhODI2YzJkYzJ...
Submission Tags: 7494234
Submission: On April 21 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on April 18th 2022. Valid for: 3 months.
This is the only time puellabeauty.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Nedbank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.206.137.117 52.206.137.117 | 14618 (AMAZON-AES) (AMAZON-AES) | |
2 3 | 162.241.124.211 162.241.124.211 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-206-137-117.compute-1.amazonaws.com
rebrand.ly |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-124-211.unifiedlayer.com
puellabeauty.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
puellabeauty.com
2 redirects
puellabeauty.com |
769 B |
1 |
rebrand.ly
1 redirects
rebrand.ly — Cisco Umbrella Rank: 76949 |
295 B |
1 | 2 |
Domain | Requested by | |
---|---|---|
3 | puellabeauty.com | 2 redirects |
1 | rebrand.ly | 1 redirects |
1 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
webdisk.puellabeauty.com R3 |
2022-04-18 - 2022-07-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://puellabeauty.com/Up/nedbank/app/login.php?MTY1MDUzNDQzMWYyMzM4NjRmYzM1MmUwNGVmOGZiNWNhZTg1MWE1MjQ0ZWZhODI2YzJkYzJlMjVjY2MzYTgwNTA1NzQ3NTJiYWFkMGQ0ZWU2Zg==
Frame ID: D40AC4A3FD28AF666A0AD16AB6F298F7
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Online BankingPage URL History Show full URLs
-
https://rebrand.ly/sow0qg9
HTTP 301
https://puellabeauty.com/Up/nedbank HTTP 301
https://puellabeauty.com/Up/nedbank/ HTTP 302
https://puellabeauty.com/Up/nedbank/app/login.php?MTY1MDUzNDQzMWYyMzM4NjRmYzM1MmUwNGVmOGZiNWNhZTg1MWE... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rebrand.ly/sow0qg9
HTTP 301
https://puellabeauty.com/Up/nedbank HTTP 301
https://puellabeauty.com/Up/nedbank/ HTTP 302
https://puellabeauty.com/Up/nedbank/app/login.php?MTY1MDUzNDQzMWYyMzM4NjRmYzM1MmUwNGVmOGZiNWNhZTg1MWE1MjQ0ZWZhODI2YzJkYzJlMjVjY2MzYTgwNTA1NzQ3NTJiYWFkMGQ0ZWU2Zg== Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
puellabeauty.com/Up/nedbank/app/ Redirect Chain
|
2 MB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
736 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
162 KB 162 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
933 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
12 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
310 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
474 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
158 KB 158 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Nedbank (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails function| savepage_ShadowLoader1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
puellabeauty.com/ | Name: PHPSESSID Value: 1ec699ab0bba93f1ff0289f386ac8ef7 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
puellabeauty.com
rebrand.ly
162.241.124.211
52.206.137.117
24af98f5927069908c81e519b1082493492411999b322d3297a0be59baed39ed
39b5f1c0f6f72d7ca3c3181749b646470718a5a8eca80ce13d0b63c15edb2e7c
3bf07d30c5c5867acf6a3ec763086a9c3d1ea5c7e6783c1550e1309c67e59bf3
5c6c8d8c0e52c66587d5f15d69de975d84894fc26afc864cd7b3eebde68b426c
69ebe717522a7556601267b35fb94240f7e9de4e9909ff4e64bfbf2d62d82653
8fd778cf8be190de02f1a95bb0a3d1ba158c4041b109fa8ac002c245056e06dc
9731178a65895ad7a2835bb97c7d3e1fbb030448ce0af77fad66d45559beee0d
ad51841bf5cf5eb27ead0ae50f936f678eeb2d4e1be6035e83fce13b0e3b83bb
b56bd2aeb39c48bb1732623689421c02c93461a6024a657124450d5664bbbb56
c9530d7b754d6ccb371e5c96c5efb0e0c643b384d758e663d3fb4cf16b7dd546
d88fedad79f51cae5be17cd5ee16ea706978380791b34100beade1881a5974f4
e79680516f7aebb8535d875afb21b608dc955fa48f3084502858ea7513ba547c
eaa561f9f8ef5b69bd39e15e332dc3700decacebf48e08b0640ad3a5d8711f65
f7baf6fab8ed8563ffcf45e566735dc4adf36fd5243d0c2ffdf472905bc7e018