suncorp-sec4.com
Open in
urlscan Pro
193.233.202.162
Malicious Activity!
Public Scan
Effective URL: https://suncorp-sec4.com/bdg
Submission: On January 15 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by R3 on January 15th 2023. Valid for: 3 months.
This is the only time suncorp-sec4.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 9 | 193.233.202.162 193.233.202.162 | 200019 (ALEXHOST) (ALEXHOST) | |
1 | 69.16.175.42 69.16.175.42 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
suncorp-sec4.com
2 redirects
suncorp-sec4.com |
110 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 672 |
31 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
9 | suncorp-sec4.com |
2 redirects
suncorp-sec4.com
code.jquery.com |
1 | code.jquery.com |
suncorp-sec4.com
|
8 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
demo.bendigobank.com.au |
itunes.apple.com |
play.google.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
suncorp-sec4.com R3 |
2023-01-15 - 2023-04-15 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://suncorp-sec4.com/bdg
Frame ID: 1A46F038F38BEF73258B384831F18EE7
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Bendigo Bank - Logon to e-bankingPage URL History Show full URLs
-
http://suncorp-sec4.com/
HTTP 301
https://suncorp-sec4.com/ HTTP 302
https://suncorp-sec4.com/bdg Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Take a tour
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://suncorp-sec4.com/
HTTP 301
https://suncorp-sec4.com/ HTTP 302
https://suncorp-sec4.com/bdg Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
bdg
suncorp-sec4.com/ Redirect Chain
|
34 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
suncorp-sec4.com/assets/bdg/ |
19 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
actions.js
suncorp-sec4.com/assets/js/ |
778 B 667 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-regular__510298c5f4.woff2
suncorp-sec4.com/assets/bdg/ |
12 KB 12 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-bold__aac7e61091.woff2
suncorp-sec4.com/assets/bdg/ |
11 KB 11 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kb-banner.jpg
suncorp-sec4.com/assets/bdg/ |
69 KB 69 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
action
suncorp-sec4.com/apis/lr/ |
25 B 338 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery string| lrbank string| lrinfo boolean| continueupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
suncorp-sec4.com/ | Name: PHPSESSID Value: jiu9b0ka3cbbdpt05k1vgidn9b |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
suncorp-sec4.com
193.233.202.162
69.16.175.42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