post.financemobapp.com
Open in
urlscan Pro
139.59.132.8
Malicious Activity!
Public Scan
Submission: On February 24 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 24th 2024. Valid for: 3 months.
This is the only time post.financemobapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PostFinance (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 139.59.132.8 139.59.132.8 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
6 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
financemobapp.com
post.financemobapp.com |
177 KB |
6 | 1 |
Domain | Requested by | |
---|---|---|
6 | post.financemobapp.com |
post.financemobapp.com
|
6 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.postfinance.ch |
Subject Issuer | Validity | Valid | |
---|---|---|---|
post.financemobapp.com R3 |
2024-02-24 - 2024-05-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://post.financemobapp.com/
Frame ID: 2ECC7FC8F8F0C43292E419CFB2D27917
Requests: 6 HTTP requests in this frame
6 Outgoing links
These are links going to different origins than the main page.
Title: Mot de passe oublié?
Search URL Search Domain Scan URL
Title: Aide aux procédures de login
Search URL Search Domain Scan URL
Title: Version démo e-finance
Search URL Search Domain Scan URL
Title: Commander e-finance
Search URL Search Domain Scan URL
Title: Vers postfinance.ch
Search URL Search Domain Scan URL
Title: Mentions légales et accessibilité
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
post.financemobapp.com/ |
19 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-Crk9bycB.css
post.financemobapp.com/build/assets/ |
19 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-DpXf7RNL.js
post.financemobapp.com/build/assets/ |
30 KB 12 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
livewire.js
post.financemobapp.com/livewire/ |
318 KB 71 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
light-DNCMwyHk.woff2
post.financemobapp.com/build/assets/ |
42 KB 42 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
medium-LkBzPKBY.woff2
post.financemobapp.com/build/assets/ |
41 KB 41 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PostFinance (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| Livewire object| Alpine function| axios2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
post.financemobapp.com/ | Name: XSRF-TOKEN Value: eyJpdiI6Ik9RRWtRQkFqZkl2eUxBRGF1MUkxWGc9PSIsInZhbHVlIjoiNXliak9IeVh4SzBSaDBGOUhZdndFeGxlY3NLUEY1YkNYTTdHVXlrWUdZdjhyTVR0ell4RGcwOGcyaG1xd2pnQ3pjQThlN1AzL0VsUCtiVlpFZ2Y3UEczQ0tZMENGZlpYTnZUVG1SU3VOMmhDUzlmaW12U3ZsYWFEc3NXa09ETzEiLCJtYWMiOiI2MGZiOWRiZmRhMTUyMDE2ZjU3NjM4ZWNiZTE4ZDBiYmRmMWIyZTM3YWJkNDdiYTU3NWI2MTMyNTc5OGY2MjY0IiwidGFnIjoiIn0%3D |
|
post.financemobapp.com/ | Name: laravel_session Value: eyJpdiI6ImovQWpSL1QvTTIyazhkYXlPNWtEVlE9PSIsInZhbHVlIjoiQ24rSGZOb0t2QVJwN0VYMk9KRSswekgybCtBcGk2UlU5RWlyQWdpd0pFUzBzaFV5d3FFcUJIYS92SjNYRWtKYVEvaW1CQXpKN291dzhFUVBYRnlrc2ZBMVZMZzRqVmVXYnR5ak0ySFFUTFVpM1pMTDZLcTZJVUZzaVhiTlNRNzEiLCJtYWMiOiJlODk2MmNhMDhhNmIwYTQ1OTQzMTc4MGJkMTNkNjVjMDg2ZWJjNzA3NGJhMTUwYzUxMmRiM2QyNzI2NWQ1ODQwIiwidGFnIjoiIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
post.financemobapp.com
139.59.132.8
136b78fea71c3580eee5760aeafa28a0f273afb37961996d77fcde3ccbaba3cd
66305bcdd98d93c2ccdf110d616142c34c7254138f5800beed8ec498fae3816b
67aa6ed707de7c454602976c0ea4dff169d0366409d44eeffad1f01d64134930
c66d1bf50ce271a9618816ee96dddc206d50fac14c28d714e7f445d7b15ae78e
d57f0454f106eff11c18b45792a1be05ca0cd79ea653a201a37939e8235eff73
ddcf221f9ba32ec5d0bd05ad2207e370e7d399e7dd348ea1fee2c0e7c1135c0d