painel.maxximassa.com
Open in
urlscan Pro
2606:4700:3030::6818:765e
Malicious Activity!
Public Scan
Effective URL: https://painel.maxximassa.com/app/sz/account/sign-in/
Submission Tags: phishing malicious Search All
Submission: On June 14 via api from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on January 15th 2020. Valid for: 9 months.
This is the only time painel.maxximassa.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Venmo (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 10 | 2606:4700:303... 2606:4700:3030::6818:765e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2600:9000:20e... 2600:9000:20eb:6400:f:32b9:d500:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
maxximassa.com
4 redirects
painel.maxximassa.com |
143 KB |
1 |
venmo.com
cdn1.venmo.com |
2 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
10 | painel.maxximassa.com |
4 redirects
painel.maxximassa.com
|
1 | cdn1.venmo.com |
painel.maxximassa.com
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-01-15 - 2020-10-09 |
9 months | crt.sh |
*.venmo.com Go Daddy Secure Certificate Authority - G2 |
2018-10-23 - 2020-12-22 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://painel.maxximassa.com/app/sz/account/sign-in/
Frame ID: 112E1CBA28852B0521372E55BF6C1689
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://painel.maxximassa.com/app/sz/?process=YnJhc292MTk3NEB5YWhvby5jb20
HTTP 302
https://painel.maxximassa.com/app/sz/account HTTP 301
https://painel.maxximassa.com/app/sz/account/ HTTP 302
https://painel.maxximassa.com/app/sz/account/sign-in HTTP 301
https://painel.maxximassa.com/app/sz/account/sign-in/ Page URL
Detected technologies
React (JavaScript Frameworks) ExpandDetected patterns
- html /<[^>]+data-react/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://painel.maxximassa.com/app/sz/?process=YnJhc292MTk3NEB5YWhvby5jb20
HTTP 302
https://painel.maxximassa.com/app/sz/account HTTP 301
https://painel.maxximassa.com/app/sz/account/ HTTP 302
https://painel.maxximassa.com/app/sz/account/sign-in HTTP 301
https://painel.maxximassa.com/app/sz/account/sign-in/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
painel.maxximassa.com/app/sz/account/sign-in/ Redirect Chain
|
10 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
auth.compiled.css
painel.maxximassa.com/app/sz/account/lib/css/ |
282 KB 105 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AppStore.png
painel.maxximassa.com/app/sz/account/lib/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PlayStore.png
painel.maxximassa.com/app/sz/account/lib/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
LucasCircular.png
painel.maxximassa.com/app/sz/account/lib/img/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.js
painel.maxximassa.com/app/sz/account/lib/js/ |
5 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
venmo-logo-blue.svg
cdn1.venmo.com/production/images/assets/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Venmo (Financial)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
painel.maxximassa.com/ | Name: PHPSESSID Value: 668a96e10667b5576a636b9692dc89b5 |
|
.maxximassa.com/ | Name: __cfduid Value: dcc5c7483f53184805e37a1f50b6a93b71592152158 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn1.venmo.com
painel.maxximassa.com
2600:9000:20eb:6400:f:32b9:d500:93a1
2606:4700:3030::6818:765e
0e27ab38ac4f6481ffa0245da05e945f35a20101e129dc77cd138e77816974ca
201846346a7e06da7554b4ecd99f14bdbb011257abf42bc61bdaa8a91f122fff
6aa6f75c9db878e2e6bbfef8128a5d6d913d34565049b31ed2d0614be21b76db
a886c52189cd5c900bc6a8f65d46d87ddbde4020a83a4095a3f002ee01f9f01f
ae2537b2e4ab78135331376002e6981fc1c98889697198d84385954aa7e2ab1c
b3813ab6b8bd554116330f38f83ce6f12674a4497c81ca04cc1f8ba733a4879e
b60518371d223bc39cc7c62e5e54914aaed211eb8d5748b321323d7cd4b55743