egunt.unitru.edu.pe
Open in
urlscan Pro
190.119.49.79
Malicious Activity!
Public Scan
Submission: On September 16 via manual from US — Scanned from CA
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on May 20th 2024. Valid for: a year.
This is the only time egunt.unitru.edu.pe was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Truist Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 190.119.49.79 190.119.49.79 | 12252 (America M...) (America Movil Peru S.A.C.) | |
1 | 195.80.159.133 195.80.159.133 | 29152 (DECKNET-AS) (DECKNET-AS) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 215 |
6 KB |
1 |
l2.io
l2.io — Cisco Umbrella Rank: 161395 |
229 B |
1 |
unitru.edu.pe
egunt.unitru.edu.pe |
331 KB |
3 | 3 |
Domain | Requested by | |
---|---|---|
1 | cdnjs.cloudflare.com |
egunt.unitru.edu.pe
|
1 | l2.io |
egunt.unitru.edu.pe
|
1 | egunt.unitru.edu.pe | |
3 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.unitru.edu.pe Sectigo RSA Domain Validation Secure Server CA |
2024-05-20 - 2025-06-19 |
a year | crt.sh |
l2.io R10 |
2024-09-02 - 2024-12-01 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-07-31 - 2024-10-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://egunt.unitru.edu.pe/Online-banking-profile_TruistOnline.html
Frame ID: 1D33805F569D713CD4F4B849A20A3CF2
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Online banking profile | Truist OnlineDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Online-banking-profile_TruistOnline.html
egunt.unitru.edu.pe/ |
1 MB 331 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ip.js
l2.io/ |
25 B 229 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
47 KB 47 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
52 KB 52 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Truist Bank (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| savepage_ShadowLoader string| userip function| isNumber0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
egunt.unitru.edu.pe
l2.io
104.17.25.14
190.119.49.79
195.80.159.133
167ee73efd3d71e82d6f18773dc63151692525dc273eb15879a3bb45fd03ee9a
2574d7302123369d60192dc3ccdad6eb6399e8fb45c993ad39f52ca914ae8b92
62ed8e63459d2d30df43d4f715cfe7b1c09f5d31c98696acc9b537e919efda39
76ca145d9d10e35cdcb5ec435ca6464190b663e1d03e809d837d78d02f8a82bf
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
d2e2e20fc9729fb0389392bde5a8fd1b4cb390dd8689ce7a1c3fe83cc91b0d52
f87b567095229d6c5298353136c8c7c1b268fe1b8d996b7ab29b07f7ae97ec08