URL: http://www.icict.org.zm/word/wellsfargoservice121/wfad/
Submission Tags: 6488368
Submission: On April 05 via api from NL

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 3 HTTP transactions. The main IP is 41.63.0.22, located in Zambia and belongs to ZAMREN, ZM. The main domain is www.icict.org.zm.
This is the only time www.icict.org.zm was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
2 41.63.0.22 37532 (ZAMREN)
1 143.204.101.195 16509 (AMAZON-02)
3 2
Apex Domain
Subdomains
Transfer
2 icict.org.zm
www.icict.org.zm
75 KB
1 cloudfront.net
dg6qn11ynnp6a.cloudfront.net
31 KB
3 2
Domain Requested by
2 www.icict.org.zm www.icict.org.zm
1 dg6qn11ynnp6a.cloudfront.net www.icict.org.zm
3 2

This site contains no links.

Subject Issuer Validity Valid
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh

This page contains 1 frames:

Primary Page: http://www.icict.org.zm/word/wellsfargoservice121/wfad/
Frame ID: 480B68AB375077F7331E47E2D47A6CF2
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

33 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

106 kB
Transfer

104 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.icict.org.zm/word/wellsfargoservice121/wfad/
1 KB
2 KB
Document
General
Full URL
http://www.icict.org.zm/word/wellsfargoservice121/wfad/
Protocol
HTTP/1.1
Server
41.63.0.22 , Zambia, ASN37532 (ZAMREN, ZM),
Reverse DNS
webservices.zamren.zm
Software
Apache /
Resource Hash
cb184293969aa315e2760e9fa58945bd4c58bc5882e553addf2e398188daaf7e

Request headers

Host
www.icict.org.zm
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 05 Apr 2020 23:01:25 GMT
Server
Apache
Last-Modified
Tue, 10 Dec 2019 18:53:48 GMT
Accept-Ranges
bytes
Content-Length
1479
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html
gen_validatorv2.js
www.icict.org.zm/word/wellsfargoservice121/wfad/
72 KB
73 KB
Script
General
Full URL
http://www.icict.org.zm/word/wellsfargoservice121/wfad/gen_validatorv2.js
Requested by
Host: www.icict.org.zm
URL: http://www.icict.org.zm/word/wellsfargoservice121/wfad/
Protocol
HTTP/1.1
Server
41.63.0.22 , Zambia, ASN37532 (ZAMREN, ZM),
Reverse DNS
webservices.zamren.zm
Software
Apache /
Resource Hash
b8a71382106fe44f8866a7645fef4049ef5458223e655cdbdca76a1dde4bd0e6

Request headers

Referer
http://www.icict.org.zm/word/wellsfargoservice121/wfad/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 05 Apr 2020 23:01:25 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
wellsfargo200x200.jpg
dg6qn11ynnp6a.cloudfront.net/wp-content/uploads/2016/02/02144636/
30 KB
31 KB
Image
General
Full URL
https://dg6qn11ynnp6a.cloudfront.net/wp-content/uploads/2016/02/02144636/wellsfargo200x200.jpg
Requested by
Host: www.icict.org.zm
URL: http://www.icict.org.zm/word/wellsfargoservice121/wfad/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.195 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-101-195.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f2163d39d322368519ce2c0be0df0bd01b4f7b152d1f5b2dc098b3d0ff026be5

Request headers

Referer
http://www.icict.org.zm/word/wellsfargoservice121/wfad/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Sun, 05 Apr 2020 23:01:27 GMT
Via
1.1 479d15a99f4dd073131fba1516541469.cloudfront.net (CloudFront)
Last-Modified
Tue, 02 Feb 2016 19:47:16 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA50-C1
ETag
"cd6d0b46a6c8e48e23f70d13e3542805"
X-Cache
Miss from cloudfront
x-amz-version-id
m8hDyIGakBXBPYbHrl5spMo9id6VPdHB
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
image/jpeg
Content-Length
31121
X-Amz-Cf-Id
yQTCuI7zZ0hfBAWZEU-w0DmfbSyvmnDRqcxYEEPbhiRo--BTpXoslw==
Expires
Fri, 30 Jan 2026 19:46:36 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

dg6qn11ynnp6a.cloudfront.net
www.icict.org.zm
143.204.101.195
41.63.0.22
b8a71382106fe44f8866a7645fef4049ef5458223e655cdbdca76a1dde4bd0e6
cb184293969aa315e2760e9fa58945bd4c58bc5882e553addf2e398188daaf7e
f2163d39d322368519ce2c0be0df0bd01b4f7b152d1f5b2dc098b3d0ff026be5