www.viettaichi.q4.pl
Open in
urlscan Pro
2400:cb00:2048:1::681b:8adc
Malicious Activity!
Public Scan
Submission: On June 22 via automatic, source phishtank
Summary
This is the only time www.viettaichi.q4.pl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Itau (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2400:cb00:204... 2400:cb00:2048:1::681b:8adc | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
5 | 2400:cb00:204... 2400:cb00:2048:1::681b:8bdc | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
13 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.viettaichi.q4.pl |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.viettaichi.q4.pl |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
q4.pl
www.viettaichi.q4.pl |
195 KB |
1 |
jquery.com
code.jquery.com |
37 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | www.viettaichi.q4.pl |
www.viettaichi.q4.pl
code.jquery.com |
1 | code.jquery.com |
www.viettaichi.q4.pl
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.viettaichi.q4.pl//Cliente/atendimento/chamada.php?=Q2GYLCXPLI2B74UNB5RB1K5ADVOT88WY0DWUPUKBCLNJPI81MYCMJGXWCLPKTMI3ZFXOAH1M4O7S7DSSC6FVMCRYYHJR43U4IRRS0SFCGL6NYYFB4V7P9YO7G8YK0TNRKFKU8Z8OKCBJARUEM24U1R2HZZ29SO1D4K9BKFZ5SBO43JHPLKKLCL3BL4KDSKRW6Z8PF8U8IJAL3RANCU9OFBZ1FJE9575A7B1LIUT2D4MFVW48RCW8NV94FMBJSFUYRUKAODB3HYIDULLMXHTLD2PSO2CHH7G921IPEUSWSA0NWU0UC4FP66IT7VBN3RW4SET80L42WDOS9YMK33A88S2ENC3P4YSWDM4M88N4KCWSBIDDLNKTFL84X0T28LYK937F0UJU8FNIX1VINGB42J7ZSZ21LZLT3R9BMR7T8TC5U8NHNZKPIROBQPBBPX6RPE4B706D4HHXO6FC512NRQYHGAT78YXXD29JBDW
Frame ID: 2226E85F9EA4452B524153EBEA7EE53A
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
chamada.php
www.viettaichi.q4.pl//Cliente/atendimento/ |
754 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.9.1.min.js
code.jquery.com/ |
90 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
www.viettaichi.q4.pl//Cliente/atendimento/js/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
norm.css
www.viettaichi.q4.pl//Cliente/atendimento/css/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
princ.php
www.viettaichi.q4.pl//Cliente/atendimento/ |
3 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
function.php
www.viettaichi.q4.pl//Cliente/atendimento/ |
82 B 405 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
www.viettaichi.q4.pl//Cliente/atendimento/js/ |
5 KB 2 KB |
XHR
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prg.png
www.viettaichi.q4.pl//Cliente/atendimento/img/ |
77 KB 77 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
norm.png
www.viettaichi.q4.pl//Cliente/atendimento/img/ |
47 KB 47 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tbb1.jpg
www.viettaichi.q4.pl//Cliente/atendimento/img/ |
49 KB 49 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atribate2.png
www.viettaichi.q4.pl//Cliente/atendimento/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
norm.css
www.viettaichi.q4.pl//Cliente/atendimento/css/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
Cookie set
function.php
www.viettaichi.q4.pl//Cliente/atendimento/ |
82 B 541 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Itau (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| imgsenhaclick function| post function| Formata function| FormataNasci function| SomenteNumero function| get function| nomeClick function| ValidaForm function| validas6 function| getprinc string| STATUS string| msgold number| a2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.viettaichi.q4.pl/ | Name: PHPSESSID Value: c6jdc8egos71rjcen92lfnep34 |
|
.q4.pl/ | Name: __cfduid Value: d128da35795e8bc43b7efe7b0df1094901529680847 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
www.viettaichi.q4.pl
205.185.208.52
2400:cb00:2048:1::681b:8adc
2400:cb00:2048:1::681b:8bdc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