
erte14.girisa.com
Open in
urlscan Pro
117.103.69.38
Malicious Activity!
Public Scan
Effective URL: http://erte14.girisa.com/android/qwe/b-mver1945882.php?412add00473818649d6c5a252f0c2c144a57199236a7f9d12d60ea0b650fc6c85f...
Submission: On March 28 via manual from RO
Summary
This is the only time erte14.girisa.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of Montreal (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 117.103.69.38 117.103.69.38 | 56234 (NARATEL-A...) (NARATEL-AS-ID PT Naraya Telematika) | |
13 | 1 |
ASN56234 (NARATEL-AS-ID PT Naraya Telematika, ID)
PTR: ip-38-69.103.117-naratel.net.id
erte14.girisa.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
girisa.com
erte14.girisa.com |
284 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | erte14.girisa.com |
erte14.girisa.com
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://erte14.girisa.com/android/qwe/b-mver1945882.php?412add00473818649d6c5a252f0c2c144a57199236a7f9d12d60ea0b650fc6c85f7aa8770a66841239750784e1e12fbdc55324fe014ea187eb0fbfeafcbe5b982e3bc1bac54d32534793616b98c5d93d7affdde743099893fb8e
Frame ID: 6359E7EA82B668D6D740A86967A83459
Requests: 13 HTTP requests in this frame
Screenshot

Page URL History Show full URLs
- http://erte14.girisa.com/android/qwe/ Page URL
- http://erte14.girisa.com/android/qwe/b-mver1945882.php?412add00473818649d6c5a252f0c2c144a57199236a7f9... Page URL
Detected technologies

Detected patterns
- headers server /Ubuntu/i
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://erte14.girisa.com/android/qwe/ Page URL
- http://erte14.girisa.com/android/qwe/b-mver1945882.php?412add00473818649d6c5a252f0c2c144a57199236a7f9d12d60ea0b650fc6c85f7aa8770a66841239750784e1e12fbdc55324fe014ea187eb0fbfeafcbe5b982e3bc1bac54d32534793616b98c5d93d7affdde743099893fb8e Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
erte14.girisa.com/android/qwe/ |
474 B 559 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
b-mver1945882.php
erte14.girisa.com/android/qwe/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ee93437b7gf2e48h.css
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f1444g8d4f48f189.css
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
34 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f47h33be4e164heg.css
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
623 B 667 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2cg1933c454075fg.css
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
133 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
822dgbh93f43h53f.css
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
774 KB 60 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4e93g94635465d07.js
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g64e371b45ecb4h3.png
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
db396c5df71bgf4b.png
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
331 B 622 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ge3177ch93492h1f.png
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
131 KB 131 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
e95d84gd2egc13gc.woff
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
27 KB 27 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2ddfgebc30bfcec8.woff
erte14.girisa.com/android/qwe/8c5cgc76136c8heg/ |
27 KB 28 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of Montreal (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| hasNumber function| bmc function| removeSpacesFromPAN function| verifyMod10 function| formSub function| logPANentry0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
erte14.girisa.com
117.103.69.38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