bigbanks.ru
Open in
urlscan Pro
46.4.203.59
Malicious Activity!
Public Scan
Submission: On June 09 via automatic, source phishtank
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on April 1st 2020. Valid for: 3 months.
This is the only time bigbanks.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Capitec Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 46.4.203.59 46.4.203.59 | 24940 (HETZNER-AS) (HETZNER-AS) | |
1 | 2a00:1450:400... 2a00:1450:4001:814::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:81f::2003 | 15169 (GOOGLE) (GOOGLE) | |
12 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
bigbanks.ru
bigbanks.ru |
29 KB |
1 |
gstatic.com
fonts.gstatic.com |
11 KB |
1 |
googleapis.com
fonts.googleapis.com |
503 B |
12 | 3 |
Domain | Requested by | |
---|---|---|
10 | bigbanks.ru |
bigbanks.ru
|
1 | fonts.gstatic.com |
bigbanks.ru
|
1 | fonts.googleapis.com |
bigbanks.ru
|
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bigbanks.ru Let's Encrypt Authority X3 |
2020-04-01 - 2020-06-30 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-05-20 - 2020-08-12 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-05-20 - 2020-08-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bigbanks.ru/ncus/esap.html
Frame ID: D8F7D5BC8527F2EC9F6522426657F7C1
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
esap.html
bigbanks.ru/ncus/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default-3.0.0.css
bigbanks.ru/ncus/ |
55 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui-1.8.10.custom.min.css
bigbanks.ru/ncus/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default.custom.min-1.1.0.css
bigbanks.ru/ncus/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
858 B 503 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_main.png
bigbanks.ru/ncus/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loginSubmitForm-1.0.0.js.download
bigbanks.ru/ncus/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
proceed.gif
bigbanks.ru/ncus/ |
259 B 384 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SSL-certificate-seal-ssl-animated.gif
bigbanks.ru/ncus/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
EYqxmaNOzLlWtsZSScy6XTNpcZGf2w.woff2
fonts.gstatic.com/s/ropasans/v9/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-basic-webfont.woff
bigbanks.ru/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-basic-webfont.ttf
bigbanks.ru/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Capitec Bank (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bigbanks.ru/ | Name: PHPSESSID Value: 11a4769b79d2726d5f1eab9f3895ea22 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bigbanks.ru
fonts.googleapis.com
fonts.gstatic.com
2a00:1450:4001:814::200a
2a00:1450:4001:81f::2003
46.4.203.59
012a4430cf4e544d2f46f927abf07599d99e912d9dbd5368e59aa0d1db7c249d
49bae83e26d9e399cc139265d607d0f6f59ab5d318623fd375fb5e022ff9771c
5acd35d92607514c1364dc42f29e96e563859c3b1c6cdd8a3b6dbb572523241c
8c6cc4a59a3652eeab42c1f31e3144070f7d7aad696fe7694f046daf3a2da2b9
aae304e25813c81be17fd70ef4bf31f572ac3f807bb53987a31e9606534bbf41
d6760b85c62431567ea152b3c55feba168e01a13884517d16b1fa5a57d29ffb5
f1089c5cf208cdc84deaef907e1ed61b2ac816d890e8f7d9408a1c33287ecb72