evolque2020.lon.wafaicloud.com
Open in
urlscan Pro
185.206.28.147
Malicious Activity!
Public Scan
Submission: On January 01 via automatic, source openphish
Summary
This is the only time evolque2020.lon.wafaicloud.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Itau (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 185.206.28.147 185.206.28.147 | 202105 (DSP-AS) (DSP-AS) | |
2 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a04:4e42:1b:... 2a04:4e42:1b::621 | 54113 (FASTLY) (FASTLY) | |
1 | 2a00:1450:400... 2a00:1450:4001:816::200a | 15169 (GOOGLE) (GOOGLE) | |
12 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
wafaicloud.com
evolque2020.lon.wafaicloud.com |
30 KB |
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
39 KB |
1 |
googleapis.com
ajax.googleapis.com |
29 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net |
8 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
12 | 5 |
Domain | Requested by | |
---|---|---|
7 | evolque2020.lon.wafaicloud.com |
evolque2020.lon.wafaicloud.com
|
2 | stackpath.bootstrapcdn.com |
evolque2020.lon.wafaicloud.com
|
1 | ajax.googleapis.com |
evolque2020.lon.wafaicloud.com
|
1 | cdn.jsdelivr.net |
evolque2020.lon.wafaicloud.com
|
1 | code.jquery.com |
evolque2020.lon.wafaicloud.com
|
12 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
f3.shared.global.fastly.net GlobalSign CloudSSL CA - SHA256 - G3 |
2020-10-26 - 2021-04-17 |
6 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-11-10 - 2021-02-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://evolque2020.lon.wafaicloud.com/tic/tok/legal/ItauPersonalite/acesso-desktop/GRIPNET/verificardados.php
Frame ID: 57118DC26C68DD16F2A5859CC87434EB
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Lua (Programming Languages) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
verificardados.php
evolque2020.lon.wafaicloud.com/tic/tok/legal/ItauPersonalite/acesso-desktop/GRIPNET/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
evolque2020.lon.wafaicloud.com/tic/tok/legal/ItauPersonalite/acesso-desktop/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/ |
156 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-itau-personnalite-desktop.png
evolque2020.lon.wafaicloud.com/tic/tok/legal/ItauPersonalite/acesso-desktop/img/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
adsadasdsad.png
evolque2020.lon.wafaicloud.com/tic/tok/legal/ItauPersonalite/acesso-desktop/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sadsdsadasd.png
evolque2020.lon.wafaicloud.com/tic/tok/legal/ItauPersonalite/acesso-desktop/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app_footer.png
evolque2020.lon.wafaicloud.com/tic/tok/legal/ItauPersonalite/acesso-desktop/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.slim.min.js
code.jquery.com/ |
69 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.0/dist/umd/ |
21 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/ |
59 KB 16 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.1/ |
82 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
backgroundgeral.png
evolque2020.lon.wafaicloud.com/tic/tok/legal/ItauPersonalite/acesso-desktop/img/ |
911 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Itau (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| Popper object| bootstrap function| mascara function| execmascara function| mcc function| id function| mascaraData function| mtel1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
evolque2020.lon.wafaicloud.com/ | Name: PHPSESSID Value: 8cc2df9cebd0488640c43da869f33252 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.jsdelivr.net
code.jquery.com
evolque2020.lon.wafaicloud.com
stackpath.bootstrapcdn.com
185.206.28.147
2001:4de0:ac19::1:b:2b
2001:4de0:ac19::1:b:3a
2a00:1450:4001:816::200a
2a04:4e42:1b::621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