thnk.herokuapp.com
Open in
urlscan Pro
54.159.116.102
Malicious Activity!
Public Scan
Effective URL: http://thnk.herokuapp.com/
Submission: On October 21 via manual from GB — Scanned from NL
Summary
This is the only time thnk.herokuapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: State Bank of India (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 54.159.116.102 54.159.116.102 | 14618 (AMAZON-AES) (AMAZON-AES) | |
3 | 1 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-159-116-102.compute-1.amazonaws.com
thnk.herokuapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
herokuapp.com
thnk.herokuapp.com |
76 KB |
1 |
3c5.com
1 redirects
3c5.com |
1 KB |
3 | 2 |
Domain | Requested by | |
---|---|---|
3 | thnk.herokuapp.com |
thnk.herokuapp.com
|
1 | 3c5.com | 1 redirects |
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://thnk.herokuapp.com/
Frame ID: 98B03810F35FBF38F283435C31B5FE11
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
0nlinePage URL History Show full URLs
-
https://3c5.com/sxqvo
HTTP 301
http://thnk.herokuapp.com/ Page URL
Detected technologies
Heroku (PaaS) ExpandDetected patterns
- \.herokuapp\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://3c5.com/sxqvo
HTTP 301
http://thnk.herokuapp.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
thnk.herokuapp.com/ Redirect Chain
|
578 B 770 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qazwsxedc.png
thnk.herokuapp.com/ |
41 KB 42 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qazwsxed.png
thnk.herokuapp.com/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: State Bank of India (Banking)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
3c5.com/ | Name: XSRF-TOKEN Value: eyJpdiI6ImZ0YTR3VzBjUFlyc0xMeXNzWm0weGc9PSIsInZhbHVlIjoiUDJ4eEUzUnpRU1hkUkFoTmpSakMxaFFzZUx4MnpSZTAyXC9ldDRvWmNnUTBNd1hac2F6SVdISG12d3pGVXJkN2dFaDJKQzVvUDlqXC9FN1VQbVlSNFNHOGR3bG9pUUt1WGY1QWlVUmdIR09JMjJxTFBVS25ERWgzbWtXWkYyMFkzKyIsIm1hYyI6IjQ5MmViMzMyNjRlNWJiZTg5MjUzNGE3MDQ5MGQwZTEzMTgwNTU4MDFlMjgwNDRkMTkzMGM5MzM1MDU3YTI2YWQifQ%3D%3D |
|
3c5.com/ | Name: phpshort_session Value: eyJpdiI6Inp6VVIxc2ZsNk5VdkpyYVVyTStNVXc9PSIsInZhbHVlIjoiWUVsM3JJT1Z1SWVhcFwvekN3QVRRSjFtRndaUzlXc2J4UkROdXBOeXpoeitrUDF4cWVTM0NrMjMxMjF6a3N4Q1ZHaDRHMWlcL3V1Z2RNbllFMnhSUHVrVXZ0NFhDRzNMUlNxRmxlRE9Ebmg1XC95YzFDamdKMVFUbGx2WkphRk9lcmYiLCJtYWMiOiI0YTM3YWUzMjgwYWRiMDQwMzk2NWNhOTI1YzA4NGUxM2QwMmRhNDJlMDFlNzhmZmJmN2FiYjRmM2NjZTkwNmM0In0%3D |
|
3c5.com/ | Name: dark_mode Value: 0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
3c5.com
thnk.herokuapp.com
2a06:98c1:3121::3
54.159.116.102
3fe902c691f95d174dccef45ccf74339cc8b80e74ed67c88182f4e8c3b0c607d
b13fb564740b1bbde5347f446c4b020b9d8ba53a2aa109e034c2879011f1b2c8
f649b06706a5c977296247939c22f287176510b232932e61158a13f4eeb348af