volksbank.kontenwechsel-sandbox.de
Open in
urlscan Pro
45.94.111.126
Malicious Activity!
Public Scan
Submission: On December 01 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on November 16th 2023. Valid for: 3 months.
This is the only time volksbank.kontenwechsel-sandbox.de was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Banking (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 45.94.111.126 45.94.111.126 | 42263 (GERMANEDG...) (GERMANEDGECLOUD) | |
2 | 141.101.90.96 141.101.90.96 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 52.219.170.167 52.219.170.167 | 16509 (AMAZON-02) (AMAZON-02) | |
11 | 4 |
ASN16509 (AMAZON-02, US)
PTR: s3-w.eu-central-1.amazonaws.com
fnr-dev-bucket.s3.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
kontenwechsel-sandbox.de
volksbank.kontenwechsel-sandbox.de |
484 KB |
2 |
xs2a.com
api.xs2a.com — Cisco Umbrella Rank: 367795 |
21 KB |
1 |
amazonaws.com
fnr-dev-bucket.s3.amazonaws.com |
6 KB |
0 |
figo.me
Failed
staging-login.figo.me Failed |
|
11 | 4 |
Domain | Requested by | |
---|---|---|
7 | volksbank.kontenwechsel-sandbox.de |
volksbank.kontenwechsel-sandbox.de
|
2 | api.xs2a.com |
volksbank.kontenwechsel-sandbox.de
|
1 | fnr-dev-bucket.s3.amazonaws.com |
volksbank.kontenwechsel-sandbox.de
|
0 | staging-login.figo.me Failed |
volksbank.kontenwechsel-sandbox.de
|
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
volksbank.kontenwechsel-sandbox.de R3 |
2023-11-16 - 2024-02-14 |
3 months | crt.sh |
xs2a.com Cloudflare Inc ECC CA-3 |
2023-09-15 - 2024-09-13 |
a year | crt.sh |
*.s3.amazonaws.com Amazon RSA 2048 M01 |
2023-10-10 - 2024-07-03 |
9 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://volksbank.kontenwechsel-sandbox.de/
Frame ID: 569890D07BE4DDD59CBBEFE6FB558656
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
volksbank.kontenwechsel-sandbox.de/ |
18 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xs2a.js
api.xs2a.com/ |
53 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xs2a.css
api.xs2a.com/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
finleap.widget.js
staging-login.figo.me/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
application-81e2688b15de19fb0782283d3478468bf4c923fb7488fbd62436d364ef8d62a2.css
volksbank.kontenwechsel-sandbox.de/assets/ |
376 KB 78 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
application-e8e7c39c19292707bc8c39a21f3a82b04acc0f3fb3e92131ef62d6c2b50973b0.js
volksbank.kontenwechsel-sandbox.de/assets/ |
795 KB 238 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cf346ee26e5343f0bb9a75fd8eac4606.png
fnr-dev-bucket.s3.amazonaws.com/78/92/c6/5931698b04/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lock-header-80eb977f1c7a9392085825fecf4a2710e38fa71886928d081a83bbcf8a52505c.svg
volksbank.kontenwechsel-sandbox.de/assets/login/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
print-6e37090988719b80b63d914afd4d74f593d3e0c755c5b0642a8478d762c906cc.css
volksbank.kontenwechsel-sandbox.de/assets/ |
124 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SourceSansPro-Regular-dbdfedd3e55a6ee3c417a6a536339a8d97f3213228082d58a1265f80638db950.ttf
volksbank.kontenwechsel-sandbox.de/assets/ |
287 KB 127 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tiny_lock-3f05bd27659df22742ed9324849cb951f7a152e5cbfa4796b7b7502a64d23655.svg
volksbank.kontenwechsel-sandbox.de/assets/ |
2 KB 1007 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- staging-login.figo.me
- URL
- https://staging-login.figo.me/finleap.widget.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Banking (Banking)25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| xs2a function| HbciTanBeamer object| Showdown function| forEach function| stdExtName object| ngFileUpload function| $ function| jQuery object| jQuery1124036303615705138714 object| angular object| common object| switch_app function| URI object| html5 object| Modernizr function| moment function| Spinner object| Placeholders function| sweetAlertInitialize function| swal function| sweetAlert function| SignaturePad object| switchHelpers object| IBAN3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
volksbank.kontenwechsel-sandbox.de/ | Name: _switch_session Value: iRj4VBv71n1ftdWlMMjZwdBBFLQT%2FFSD30xljARqrksaGm4Ga%2FqiZs9y13pBotksMPiIUILfUb%2FdkADjYVk7CgxcWq3uFaSbK3qqYk0bhKf%2Bc8nPS4wwXDOEiUChUCTf%2BeHW6xbtXYZxuOWbJDrehp6fZOKteaV0HmbSKw7H9uZUK0Z%2F--VnwxPpv8VyS7%2FxTM--aOdEez%2BIZfBykjQdMkCD7Q%3D%3D |
|
.xs2a.com/ | Name: __cf_bm Value: vQ7YpYBbdPwgNbkbPXuBsJu1.kJjBZlG.ch80pWCuG0-1701413504-0-AXeY69sLUR/eCDACIwZ0wzUQ4W50W62howoZ+NUYSEGJ180PzxrirFpb620Nf4jW5BoGe3VpdO81OuYPrC8JFU0= |
|
.xs2a.com/ | Name: _cfuvid Value: wU_bL7cMyycHXnDQNf18HcyOWOtt.jeOo1jxsXfC6wo-1701413504443-0-604800000 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.xs2a.com
fnr-dev-bucket.s3.amazonaws.com
staging-login.figo.me
volksbank.kontenwechsel-sandbox.de
staging-login.figo.me
141.101.90.96
45.94.111.126
52.219.170.167
0161fc408528e44018149932f87abd1e6c2542f2857776409b3c7c265636aca7
031af95a613357081697225bf9dc1c1e3ae8f0b8055cc9265fe5e62b80fd102e
2db30fa3bc371816a4a6fd94335521615983f425889fb13f6a4cab884a00ff5c
2eff28638e4bd307d4c797d8e3a2bbe4715aa2696b1dd9b79f45f5d7e30e05a2
3f05bd27659df22742ed9324849cb951f7a152e5cbfa4796b7b7502a64d23655
6f4de16554069f1e58d6420724ad7499a1891d03f723f7b8ea0368a0b30b3b77
80eb977f1c7a9392085825fecf4a2710e38fa71886928d081a83bbcf8a52505c
dbdfedd3e55a6ee3c417a6a536339a8d97f3213228082d58a1265f80638db950
e8e7c39c19292707bc8c39a21f3a82b04acc0f3fb3e92131ef62d6c2b50973b0
e9c3c507d10c69d112d1f6182e770eaa10e558d7dab8a9252c1037808b466bb7