mgfs.es
Open in
urlscan Pro
185.176.9.32
Malicious Activity!
Public Scan
Submission: On December 24 via manual from ES — Scanned from DE
Summary
TLS certificate: Issued by R3 on November 30th 2021. Valid for: 3 months.
This is the only time mgfs.es was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Caixabank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
18 | 185.176.9.32 185.176.9.32 | 50926 (AXARNET-AS) (AXARNET-AS) | |
18 | 1 |
Domain | Requested by | |
---|---|---|
18 | mgfs.es |
mgfs.es
|
18 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
nortec-control.es R3 |
2021-11-30 - 2022-02-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mgfs.es/ando001/home/
Frame ID: 314FF43507133F07A3C1DFE9D6BE6879
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
CaiхaBank | banca digital CaiхaBankNowDetected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui[.-]([\d.]*\d)[^/]*\.js
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
mgfs.es/ando001/home/ |
40 KB 40 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
estilos-login.css
mgfs.es/ando001/home/css/ |
14 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
remake.css
mgfs.es/ando001/home/css/ |
16 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.10.4.custom.css
mgfs.es/ando001/home/css/lolopo/ |
34 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.8.3.min.js
mgfs.es/ando001/home/js/arq/jQuery/ |
91 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.9.2.custom.min.js
mgfs.es/ando001/home/js/arq/jQueryUI/ |
232 KB 232 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_caixabank_40.png
mgfs.es/ando001/home/c-images/css-images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_caixabanknow_big.png
mgfs.es/ando001/home/c-images/css-images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
candado.png
mgfs.es/ando001/imatge/lolopo/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keypad.jsp
mgfs.es/ando001/jsp/ |
13 KB 13 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keyboard.jsp
mgfs.es/ando001/jsp/ |
36 KB 36 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EloLgnB011000.js
mgfs.es/ando001/home/js/ |
30 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_world_login.png
mgfs.es/ando001/home/c-images/css-images/ |
577 B 819 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_down_login.png
mgfs.es/ando001/home/c-images/css-images/ |
158 B 399 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Semibold-webfont.woff
mgfs.es/ando001/home/fonts/ |
96 KB 96 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_check.png
mgfs.es/ando001/home/c-images/css-images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_keyboard.svg
mgfs.es/ando001/home/c-images/html-images/icons/24x24/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Regular-webfont.woff
mgfs.es/ando001/home/fonts/ |
94 KB 94 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Caixabank (Banking)138 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| DP_jQuery_1640335697222 string| a2 string| urlSha2 string| flagSha2 function| getXMLHttpRequest function| TraerContenido function| TraerContenidoQwerty function| guardarCookie function| eliminarCookie function| getCookie function| validar2 function| validateHere function| validateCLOHere function| cambioTecladoVirtual function| cambioTecladoNormal function| cambioTecladoVirtualPin function| cambioTecladoNormalPin function| cambioTecladoAccesible function| cambioTecladoQwerty function| pulsarImagen function| DetectaEnter function| DetectaTab function| tabula function| pulsaTeclaID function| buttonDelID function| buttonDelPW function| prohibidoPulsarTecla function| buttonAcep2 function| linkCandado function| cambiaEstiloInput function| enterPassword function| getObject function| muestraIdiomas function| MM_changePropObj undefined| errores function| InicializaErrores function| AddError function| isMac function| openW function| adW function| revertir boolean| funciona function| integer function| shr function| shl1 function| shl function| and function| or function| xor function| not object| state object| count object| buffer object| transformBuffer object| digestBits number| S11 number| S12 number| S13 number| S14 number| S21 number| S22 number| S23 number| S24 number| S31 number| S32 number| S33 number| S34 number| S41 number| S42 number| S43 number| S44 function| F function| G function| H function| I function| rotateLeft function| FF function| GG function| HH function| II function| transform function| init function| update function| finish function| hexa string| ascii object| hash function| MD5 function| MD5ByteArray string| passphrase string| newpass function| otpfoldregs function| Otp function| space function| EsValid function| autenticate function| submit_form_aol function| submit_olvido function| submit_idioma function| arranque function| sha2OK function| sha2KO function| checkImage function| checkSHA2 object| tecladoCryp object| tecladoCrypID object| tecladoCrypPass string| identificador string| identifiAux boolean| acept string| agt string| appVer boolean| is_mac number| iePos boolean| is_opera boolean| is_safari undefined| is_khtml boolean| is_konq number| kqPos boolean| is_ie string| ipoficines object| d object| errors function| inicia function| submitData function| comprobarInputsStyle function| cambiarTecladoAccesible function| marcarCheck number| isW3C number| isNS4 boolean| NS4 boolean| N6 string| flagIdioma boolean| flagBorsa string| flagPE string| tit0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mgfs.es
185.176.9.32
0ca642d9873edab8dd38a9758117aadbb67ead25784d39cb4999df2f6079eebc
243e7d9077b620eb71838d4b489c0aa63b453912cfa2ca71b5f68a08c69959e1
3c669add48bf3a45fa266a020fcaac2e6da0fc72d1dd95ba78ac9b77e0afba32
42dd197f5d15d2a06539ab87fb97e1d3e1c40583deee00b6899a68981f0e33fa
4e74378cbc75e1673f64d7ec55ec9b6c223ed0f6cc6f1ec95157b5a4aaeec7d3
57b972bf19c9b72a970c13eed4adc5ab29e1214c392882fbab7cf07a0abe18b9
5ac009489ecf0eb04acecc023afe768a7d42e3f90eba65f46353dd2d8d2f6698
5cd785f49ff5a788853a8b1bc12a366f9f728c640bfbf239910fcca688cf3bcf
5d94d19225f42fc1e272381d69c9f317a3e035382c6fa1229b21c9122dde3ed7
9723a6d5f5ea669e43fd75e6af8770704573ebc065e148c13c78c334654f9007
9b9cc614f8c83eb848525646cf39d0a7e804508e468babe62be37d35a39768ca
a866337babaa443c561a33460ae202c00624ae3a35b643fdafc02125b99f6f5d
ab823b2f6201651b4f8d0fc7afa16f0808ff92a96bd5a73273239151bf0e10d0
b084997c7eae34a90255681b9c6d590c3a5c3caabcd85fadc7633e378b076dba
d6ecb42cd8f64d6a0077cb5d871db9b722698158062a4a6317ac611f94372373
daf728aaefa7a524a97280481b2996b310d185ddac37a8cc26ba4cb9e79aef66
dff491d80111b1398380346a77016ed7ab3e4760ee16cdfc50658d7e53f6a3d3
e265b2bd854b829f5a86191e1a3f85e4ec39ca2194556a8be007d27dfc21ed65