xzangoo.ru
Open in
urlscan Pro
2606:4700:3031::6815:3154
Malicious Activity!
Public Scan
Effective URL: https://xzangoo.ru/web/L-1666129700634f1f24de20b
Submission: On December 08 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by E1 on November 12th 2022. Valid for: 3 months.
This is the only time xzangoo.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 19 | 2606:4700:303... 2606:4700:3031::6815:3154 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
16 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
xzangoo.ru
3 redirects
xzangoo.ru |
273 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
19 | xzangoo.ru |
3 redirects
xzangoo.ru
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.xzangoo.ru E1 |
2022-11-12 - 2023-02-10 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://xzangoo.ru/web/L-1666129700634f1f24de20b
Frame ID: 58D27FE9E4219BA59184A0D6559FBDF0
Requests: 13 HTTP requests in this frame
Frame:
https://xzangoo.ru/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1670515200
Frame ID: 781A967C9934D66BDF08ED29775FDBC6
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
98f826f2d899220b686d3243bb9096cc51ed90f6Page URL History Show full URLs
-
http://xzangoo.ru/web?__cf_chl_f_tk=0yomypawizz7qabvw.4ukx0shlynu4br_vvrtujhcgy-1669913945-0-g...
HTTP 301
https://xzangoo.ru/web?entity=60865 HTTP 301
https://xzangoo.ru/web/?entity=60865 HTTP 302
https://xzangoo.ru/web/L-1666129700634f1f24de20b Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://xzangoo.ru/web?__cf_chl_f_tk=0yomypawizz7qabvw.4ukx0shlynu4br_vvrtujhcgy-1669913945-0-ganycgzna2u&entity=60865
HTTP 301
https://xzangoo.ru/web?entity=60865 HTTP 301
https://xzangoo.ru/web/?entity=60865 HTTP 302
https://xzangoo.ru/web/L-1666129700634f1f24de20b Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
L-1666129700634f1f24de20b
xzangoo.ru/web/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
styles.css
xzangoo.ru/web/assets/css/ |
438 KB 64 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
xzangoo.ru/web/assets/js/ |
87 KB 32 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.mask.js
xzangoo.ru/web/assets/js/ |
9 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.inputmask.bundle.min.js
xzangoo.ru/web/assets/js/ |
116 KB 29 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
b_rgb.png
xzangoo.ru/web/assets/img/ |
38 KB 39 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
m_l.png
xzangoo.ru/web/assets/img/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Pc.js
xzangoo.ru/web/assets/js/ |
3 KB 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fsd-secure-esp-sprite.png
xzangoo.ru/web/assets/img/ |
473 B 990 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
help-qm-fsd.png
xzangoo.ru/web/assets/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
sign-in-sprite.png
xzangoo.ru/web/assets/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
gfootb-static-sprite.png
xzangoo.ru/web/assets/img/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
gfoot-home-icon.png
xzangoo.ru/web/assets/img/ |
144 B 666 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
invisible.js
xzangoo.ru/cdn-cgi/challenge-platform/h/b/scripts/alpha/ Frame 781A |
34 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pica.js
xzangoo.ru/cdn-cgi/challenge-platform/h/b/scripts/ Frame 781A |
18 KB 8 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
77671cf95c5db716
xzangoo.ru/cdn-cgi/challenge-platform/h/b/cv/result/ Frame 781A |
2 B 663 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontentvisibilityautostatechange function| $ function| jQuery function| Inputmask function| cMsg function| getID function| hide function| domStyle function| userId function| checkPassword function| hasWhiteSpace function| onlyNumbers2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
xzangoo.ru/ | Name: PHPSESSID Value: mesdug0fvid9tqb488547sqbl1 |
|
.xzangoo.ru/ | Name: __cf_bm Value: HQePhXNQr6eYb6dIX5AZkDZkNq9segObDg2iMlYs7Zo-1670519413-0-AdXCwtJpeBGwSnuDkIrfNTokHXKJ0VlhjEC70XROPUU7OSuAy/Jn9EuiZggULZ8xOjJEm2Tv98I0sILfYA7Cy/UIs/LS1WhS3iZ7ziqLClF88cYedejEe5wYosCump3VfXzo9nYT0hmbMfZ9m92WfbM= |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
xzangoo.ru
2606:4700:3031::6815:3154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