u542312q96.ha003.t.justns.ru
Open in
urlscan Pro
2a00:b700::2e
Malicious Activity!
Public Scan
Effective URL: http://u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/
Submission: On December 12 via api from BE
Summary
This is the only time u542312q96.ha003.t.justns.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Credit Agricole (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 46.30.213.254 46.30.213.254 | 51468 (ONECOM) (ONECOM) | |
1 | 124.156.99.47 124.156.99.47 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
2 20 | 2a00:b700::2e 2a00:b700::2e | 51659 (ASBAXET) (ASBAXET) | |
19 | 2 |
ASN51468 (ONECOM, DK)
PTR: webforward2.webpod4-cph3.one.com
lbdnh.sbikose.net |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
www.xinshidaimall.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
justns.ru
2 redirects
u542312q96.ha003.t.justns.ru |
143 KB |
1 |
xinshidaimall.com
www.xinshidaimall.com |
392 B |
1 |
sbikose.net
1 redirects
lbdnh.sbikose.net |
378 B |
19 | 3 |
Domain | Requested by | |
---|---|---|
20 | u542312q96.ha003.t.justns.ru |
2 redirects
www.xinshidaimall.com
u542312q96.ha003.t.justns.ru |
1 | www.xinshidaimall.com | |
1 | lbdnh.sbikose.net | 1 redirects |
19 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/
Frame ID: 3F03AEC9883DCE2F962235C84EC49EF5
Requests: 19 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://lbdnh.sbikose.net/
HTTP 302
http://www.xinshidaimall.com/admin/ji/ Page URL
-
http://u542312q96.ha003.t.justns.ru/zien/m/
HTTP 302
http://u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1 HTTP 301
http://u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/ Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /Win32|Win64/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://lbdnh.sbikose.net/
HTTP 302
http://www.xinshidaimall.com/admin/ji/ Page URL
-
http://u542312q96.ha003.t.justns.ru/zien/m/
HTTP 302
http://u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1 HTTP 301
http://u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://lbdnh.sbikose.net/ HTTP 302
- http://www.xinshidaimall.com/admin/ji/
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www.xinshidaimall.com/admin/ji/ Redirect Chain
|
113 B 392 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/ Redirect Chain
|
16 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
antiquus.css
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
26 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
83 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles-mod.css
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/ |
16 KB 5 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/ |
16 KB 5 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.PNG
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.PNG
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
80 KB 80 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.PNG
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
point_transp.gif
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
87 B 437 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.PNG
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main_repeat.png
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
695 B 695 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
entete_light.png
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
696 B 696 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main_haut.png
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
693 B 693 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bloc_arrond_bas.png
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
699 B 699 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bloc_arrond_haut.png
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
700 B 700 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_form.png
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
691 B 691 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
thead.png
u542312q96.ha003.t.justns.ru/zien/m/d9ae9471cd8ce53c295f4cee1cce6bc1/img/ |
689 B 689 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Credit Agricole (Banking)47 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate string| OS string| Version number| posOS number| posOS2 function| setSize function| clicPosition undefined| code undefined| pos_der_code undefined| affiche_code function| effacer function| cocherCase function| corriger string| path_static string| path_dynamic string| caisse function| raf string| urlappli string| urlapplisecu function| ValidCertif function| ValidCertifSecu string| statusconfirmer string| statusannuler string| statusaide string| statuscondjur string| statusdemo string| statuscompte string| statuscode string| statuscorriger string| statusclavnum string| statusrecom string| App number| Nav_sup boolean| browserOK boolean| browserOK1 boolean| browserOK2 function| ouvrePOPUP function| ouvreassistance function| ouvreFenetre function| validation function| isNumerique function| isAlphaNum string| srcLien string| srcPuceLien string| yesno string| authentif0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
lbdnh.sbikose.net
u542312q96.ha003.t.justns.ru
www.xinshidaimall.com
124.156.99.47
2a00:b700::2e
46.30.213.254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