kingmosque-da.info
Open in
urlscan Pro
2606:4700:3036::6815:568d
Malicious Activity!
Public Scan
Effective URL: https://kingmosque-da.info/
Submission: On November 29 via api from BR — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on November 28th 2023. Valid for: 3 months.
This is the only time kingmosque-da.info was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BDO Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:303... 2606:4700:3034::6815:5574 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 2606:4700:303... 2606:4700:3036::6815:568d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
kingmosque-da.info
kingmosque-da.info |
105 KB |
1 |
banco-online.info
1 redirects
banco-online.info |
668 B |
12 | 2 |
Domain | Requested by | |
---|---|---|
12 | kingmosque-da.info |
kingmosque-da.info
|
1 | banco-online.info | 1 redirects |
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
kingmosque-da.info GTS CA 1P5 |
2023-11-28 - 2024-02-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://kingmosque-da.info/
Frame ID: 7D9A69A0019AD3DD9A8C173949257C37
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Banco De OroPage URL History Show full URLs
-
http://banco-online.info/
HTTP 301
https://kingmosque-da.info/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://banco-online.info/
HTTP 301
https://kingmosque-da.info/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
kingmosque-da.info/ Redirect Chain
|
16 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loginid.css
kingmosque-da.info/styles/css/ |
51 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
component.style.css
kingmosque-da.info/styles/css/ |
16 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
base.css
kingmosque-da.info/styles/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
header.png
kingmosque-da.info/styles/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer.png
kingmosque-da.info/styles/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
variables_root.js
kingmosque-da.info/js_scripts/ |
220 B 416 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.js
kingmosque-da.info/js_scripts/ |
549 B 496 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bdo-logo.jpg
kingmosque-da.info/styles/ |
35 KB 36 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow-white.png
kingmosque-da.info/styles/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ad.png
kingmosque-da.info/styles/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_right.png
kingmosque-da.info/styles/ |
141 B 433 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BDO Bank (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| auth1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
kingmosque-da.info/ | Name: PHPSESSID Value: dc051ffbd9e49201d9e8f8b4e022f3f0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banco-online.info
kingmosque-da.info
2606:4700:3034::6815:5574
2606:4700:3036::6815:568d
2dc98f0809317779b2f64a3f1c0e9aedb2be1e429e10fce46e550c44112185c0
3e72af5babd1f7f1077a4091d1ced174710e72a7bd5047a8826bd5dac5412cce
405caefefce16bf6f766e7303eafb32b02da9a8be6d2e1c965e51ddbae41b852
5225eebca373ae103c2e83513cb277b4eecd319df532a4bb41868a20341e71fe
649ce520b09e82f86af594afb5c8d0c2f70773fab60d8261d6dbec6cf4230d17
a9bd4ef4f41c738dd7f6c67a1ffb9044e22d89c255ab0352261e26263e3512a1
ae7e6478a048387cc9faa5d97f7fe80b92eda486f40f54a75c168b1928246d1d
b18e02c3c784c27cb0db8ce9131cd9ccd24306971baf2057b61539562717bd38
cb1fbc8aa63167714073d9da502863cb2356c7d7a2ec250e4959e898f536ff19
cd226c25a27090e1e976b7dac689c25b27b8474763dbac6c8a684caae80e3ac4
e36e7573aa4f407a93704b899df4baa00c632328e56eaa951e8339b0b09d39a8
fad35aaa7a450a1d9628c271e8acfaada6793f878261b7644dba6a32305f0760