konto-verifizieren.com
Open in
urlscan Pro
80.66.64.139
Malicious Activity!
Public Scan
Submission: On November 18 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by R3 on November 10th 2022. Valid for: 3 months.
This is the only time konto-verifizieren.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 80.66.64.139 80.66.64.139 | 61302 (HUIZE Hui...) (HUIZE Huize Telecom) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
14 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
konto-verifizieren.com
konto-verifizieren.com |
2 MB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 669 |
132 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
12 | konto-verifizieren.com |
konto-verifizieren.com
|
2 | code.jquery.com |
konto-verifizieren.com
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
konto-verifizieren.com R3 |
2022-11-10 - 2023-02-08 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://konto-verifizieren.com/K61O2PUYAX
Frame ID: 2148EFD6EF729B1E17DF6264D7DD06AE
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
SparkasseSecure+ Umstellung | SparkasseDetected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- <div class="[^"]*parbase
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)/jquery-ui(?:\.min)?\.js
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
K61O2PUYAX
konto-verifizieren.com/ |
80 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.css
code.jquery.com/ui/1.13.1/themes/base/ |
35 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
internetfiliale.min.css
konto-verifizieren.com/filialauswahl_assets/clientlibs/myif/master/base/ |
1 MB 1 MB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
internetfiliale.min.js
konto-verifizieren.com/filialauswahl_assets/clientlibs/myif/master/base/ |
433 KB 434 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_ini.svg
konto-verifizieren.com/ |
22 KB 22 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
392x696bb.png
konto-verifizieren.com/ |
59 KB 59 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1640088281840.png
konto-verifizieren.com/content/myif/ssk-dessau/work/filiale/fi/home/siegel/_jcr_content/awards/parsys/award/image.img.png/ |
16 B 16 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1640088282484.png
konto-verifizieren.com/content/myif/ssk-dessau/work/filiale/fi/home/siegel/_jcr_content/awards/parsys/award_1/image.img.png/ |
16 B 16 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.js
code.jquery.com/ui/1.13.1/ |
517 KB 124 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sparkasse_web_Rg.woff
konto-verifizieren.com/filialauswahl_assets/clientlibs/myif/master/base/internetfiliale/fonts/ |
41 KB 41 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pictos-if.woff
konto-verifizieren.com/filialauswahl_assets/clientlibs/myif/master/base/internetfiliale/fonts/ |
197 KB 198 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sparkasse_web_Bd.woff
konto-verifizieren.com/filialauswahl_assets/clientlibs/myif/master/base/internetfiliale/fonts/ |
36 KB 36 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SparkasseHead_web_Rg.woff
konto-verifizieren.com/filialauswahl_assets/clientlibs/myif/master/base/internetfiliale/fonts/ |
29 KB 30 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1608194651895.jpg
konto-verifizieren.com/ |
117 KB 117 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sparkasse (Banking)33 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| IF6 function| getQueryParamValue undefined| IF6_lightbox_closeicon_text function| overlayShow function| overlayClose function| focusBankingFormularElement function| toggleClassInRows function| SLURI function| moveBContent object| ifLoginHeaderTimer function| refreshClientTimeout function| refreshServerTimeout undefined| startCountdownLayer function| showCountdownLayer function| updateHeaderLoginIfPresent function| tick function| setSessionTimeout function| countdownShow function| callBreakHtml object| nbfDatePicker object| nbfTanInput function| selectListBoxItem function| editTeaserRef function| pagenav_statistics_send function| pagenav_statistics function| pagenav_scroll function| pagenav_scroll_window function| $ function| jQuery object| myif function| aktualisierung_vorbereitung boolean| bcarouselAttached boolean| mkp_switcher1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
konto-verifizieren.com/ | Name: PHPSESSID Value: cv839sqdb4mj2jannafofpaeaf |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
konto-verifizieren.com
2001:4de0:ac18::1:a:1a
80.66.64.139
0df49764e93dcf8428f964409c7f0bc600f18981ee3e1ebf251bed1d3932d1aa
0e9eb66a1b33ae648ada3c56eb55fa149c4f1b88316b5a7255ca9b076740f451
2ee73fd1898343f28de6ed91576db74c150e7f91fd9f6767ae1c52a503a4728a
385bbee80414712855e9a4250cd4dcbbff192dc79136cf99fa5b62075d3bb0ad
58a6f49e92f7d2fd1246d98c568c2ac7d6be832ddfece67ec9f7ef3332766adf
5eaa073836b4aac67271aecd610a9ed4912661ba126435d4626c5cc3df122241
8a482f2271a42c5f54c96e816a84340a6f2357a5b81f927d07d00788f5140a41
9458c9806502a7e9c0e8b5bf28f6b26a07548e36882e75c16d6986e8b164ba80
a914f6b586a82a465b80ad4eff1132f00307932841c2e785541c0e5eb5f3a4ef
e7ae4d3aa60ef6c112d92d36ade9da9a057992e855aa5eb9d327050c7b3d6d1a
e97315234cc1f1c4737d98ea29c0f4d4f06c032dc5943012ae50bc4b10a92276
e9b9f03e1a75cf22118a30e0503f346e8efb6859276d418e7d1a9a07f73f7002
eb726e7747d06812f1fd551161fb45b9aaa733f97e616eb1272ec9fc0501fa86