rbc.reactivateacccount.com
Open in
urlscan Pro
185.215.113.89
Malicious Activity!
Public Scan
Effective URL: https://rbc.reactivateacccount.com/login.php
Submission: On December 20 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by R3 on December 20th 2020. Valid for: 3 months.
This is the only time rbc.reactivateacccount.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: RBC (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 185.215.113.89 185.215.113.89 | 51381 (ELITETEAM...) (ELITETEAM-PEERING-AZ1) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2606:4700:303... 2606:4700:3032::681b:b58d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 50.87.174.90 50.87.174.90 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2606:4700:20:... 2606:4700:20::681a:fdc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 5 |
ASN13335 (CLOUDFLARENET, US)
www.freevisitorcounters.com |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box2317.bluehost.com
smallenvelop.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
reactivateacccount.com
1 redirects
rbc.reactivateacccount.com |
168 KB |
3 |
freevisitorcounters.com
www.freevisitorcounters.com |
3 KB |
1 |
symptoma.com
stats.symptoma.com |
774 B |
1 |
smallenvelop.com
smallenvelop.com |
|
1 |
googleapis.com
ajax.googleapis.com |
29 KB |
10 | 5 |
Domain | Requested by | |
---|---|---|
5 | rbc.reactivateacccount.com |
1 redirects
rbc.reactivateacccount.com
|
3 | www.freevisitorcounters.com |
rbc.reactivateacccount.com
|
1 | stats.symptoma.com | |
1 | smallenvelop.com |
rbc.reactivateacccount.com
|
1 | ajax.googleapis.com |
rbc.reactivateacccount.com
|
10 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.symptoma.fr |
www.freevisitorcounters.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
reactivateacccount.com R3 |
2020-12-20 - 2021-03-20 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-11-10 - 2021-02-02 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-05 - 2021-08-05 |
a year | crt.sh |
cpanel.smallenvelop.com Let's Encrypt Authority X3 |
2020-10-28 - 2021-01-26 |
3 months | crt.sh |
symptoma.com Cloudflare Inc ECC CA-3 |
2020-05-24 - 2021-05-24 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://rbc.reactivateacccount.com/login.php
Frame ID: 2EF27F1A588A9B992DCAF86172F62563
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://rbc.reactivateacccount.com/
HTTP 302
https://rbc.reactivateacccount.com/login.php Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rbc.reactivateacccount.com/
HTTP 302
https://rbc.reactivateacccount.com/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
rbc.reactivateacccount.com/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rbody.png
rbc.reactivateacccount.com/images/ |
69 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rbottom.png
rbc.reactivateacccount.com/images/ |
93 KB 94 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buts.png
rbc.reactivateacccount.com/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
auth.php
www.freevisitorcounters.com/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8
www.freevisitorcounters.com/en/home/counter/775290/t/ |
220 B 838 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Preloader_11.gif
smallenvelop.com/wp-content/uploads/2014/08/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8
www.freevisitorcounters.com/en/counter/render/775290/t/ |
424 B 734 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
matomo.php
stats.symptoma.com/ |
43 B 774 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: RBC (Banking)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| trimTrailingSlash string| ctrHref string| ctrHref2 function| eInDoc function| lCheck boolean| linkfound object| els object| el string| linktext object| linkToHide0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
rbc.reactivateacccount.com
smallenvelop.com
stats.symptoma.com
www.freevisitorcounters.com
185.215.113.89
2606:4700:20::681a:fdc
2606:4700:3032::681b:b58d
2a00:1450:4001:801::200a
50.87.174.90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