qa.rmutto.ac.th
Open in
urlscan Pro
203.158.140.13
Malicious Activity!
Public Scan
Effective URL: https://qa.rmutto.ac.th/wp-content/uploads/2023/01/n.fcu.html
Submission: On November 20 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by AlphaSSL CA - SHA256 - G4 on July 27th 2023. Valid for: a year.
This is the only time qa.rmutto.ac.th was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Navy Federal Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 78.39.98.120 78.39.98.120 | 58224 (TCI) (TCI) | |
1 | 203.158.140.13 203.158.140.13 | 135129 (UNINET-AS...) (UNINET-AS-RMUTTO-BP Rajamangala University of Technology Tawan-okBangpra Campus) | |
1 | 162.19.58.156 162.19.58.156 | 16276 (OVH) (OVH) | |
1 | 195.80.159.133 195.80.159.133 | () () | |
4 | 5 |
ASN135129 (UNINET-AS-RMUTTO-BP Rajamangala University of Technology Tawan-okBangpra Campus, TH)
qa.rmutto.ac.th |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
vru.ac.ir
1 redirects
develop.vru.ac.ir |
950 B |
1 |
l2.io
l2.io |
|
1 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 11551 |
3 KB |
1 |
rmutto.ac.th
qa.rmutto.ac.th |
510 KB |
4 | 4 |
Domain | Requested by | |
---|---|---|
2 | develop.vru.ac.ir | 1 redirects |
1 | l2.io |
qa.rmutto.ac.th
|
1 | i.ibb.co |
qa.rmutto.ac.th
|
1 | qa.rmutto.ac.th | |
4 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.navyfederal.org |
accountservices.navyfederal.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.rmutto.ac.th AlphaSSL CA - SHA256 - G4 |
2023-07-27 - 2024-08-27 |
a year | crt.sh |
ibb.co R3 |
2023-10-09 - 2024-01-07 |
3 months | crt.sh |
l2.io R3 |
2023-10-17 - 2024-01-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://qa.rmutto.ac.th/wp-content/uploads/2023/01/n.fcu.html
Frame ID: 877ADF085EB07F8085117E7FB4A3DD76
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Navy Federal Credit Union - Our Members are the Mission®Page URL History Show full URLs
-
http://develop.vru.ac.ir/wp-admin/user/mynavyaccess
HTTP 301
http://develop.vru.ac.ir/wp-admin/user/mynavyaccess/ Page URL
- https://qa.rmutto.ac.th/wp-content/uploads/2023/01/n.fcu.html Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: Locations
Search URL Search Domain Scan URL
Title: Contact Us
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Sign In Help
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://develop.vru.ac.ir/wp-admin/user/mynavyaccess
HTTP 301
http://develop.vru.ac.ir/wp-admin/user/mynavyaccess/ Page URL
- https://qa.rmutto.ac.th/wp-content/uploads/2023/01/n.fcu.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://develop.vru.ac.ir/wp-admin/user/mynavyaccess HTTP 301
- http://develop.vru.ac.ir/wp-admin/user/mynavyaccess/
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
develop.vru.ac.ir/wp-admin/user/mynavyaccess/ Redirect Chain
|
382 B 646 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
n.fcu.html
qa.rmutto.ac.th/wp-content/uploads/2023/01/ |
929 KB 510 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
21 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ajax-loader.gif
i.ibb.co/RpLNy4f/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ip.js
l2.io/ |
27 B 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
80 KB 80 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Navy Federal Credit Union (Government)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| savepage_ShadowLoader object| _cs function| _f0 function| sendEmail string| chat_id string| bot_token function| sendEmailo function| sendEmaili function| sendEmailii function| switchVisiblee90 function| sendEmailiii function| sendEmailiiii0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
develop.vru.ac.ir
i.ibb.co
l2.io
qa.rmutto.ac.th
162.19.58.156
195.80.159.133
203.158.140.13
78.39.98.120
16eb10aacb5be4e997453d0d2501d49e7d3a236828ee90f22cd3f913951a6d67
2c7b3f8985433d00d05c5a6c832e4d8a32b88d9bed315eca96b41827623f8242
2cca552b4d48760fdce1fb2c0a21e6bf09b6ada1f7e70f5b1f4b7b810367c630
3e700f9ff93a023fcaee00daeb83062c9492803afc78643532d41d369133f991
94a271e503aa4ce07fe3c3d06dcd920cf626ea053af0c7a7917879973462e2e3
9ed975755ec57f0d8b0739f5d3dc5e7015ac1beff1cfbd6c6068f4688eafca24
a8614e2be373b6407e95bca90a8d47ebf7bccb705475a85ee9997ee01ca38133
a9950fa5ca9cf47072770900d259bcf6778aa1119652d2e706d5eb92df254199
abd0ba3bfcdb6d0b220ce116d51b7317e7e872106601e1d4451fab6f23698d42
eac7a5450fce00715e381e02b2359fa4bd7ddd5a30f52e15ca9c342ce24d3b37
efb3cdc5e4582fd67dffab6fc6e5062074ce3f8c51747346af944e97749dc309
fd29b3b084cf11160bfc4e99d98a261f2b36bff29113b07367c5204563c5d355