rucofresena.com
Open in
urlscan Pro
200.35.157.31
Malicious Activity!
Public Scan
Submission: On August 23 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 17th 2022. Valid for: 3 months.
This is the only time rucofresena.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: M&T Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 200.35.157.31 200.35.157.31 | 14259 (Gtd Inter...) (Gtd Internet S.A.) | |
8 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
rucofresena.com
rucofresena.com |
262 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | rucofresena.com |
rucofresena.com
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
rucofresena.com cPanel, Inc. Certification Authority |
2022-06-17 - 2022-09-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rucofresena.com/mtbtt/login.php?online_id=d24ff55fedbeabc1d7dc08709login_id=98deb5eb58d8cbf7f08b2457144e1d8598deb5eb58d8cbf7f08b2457144e1d85&session=98deb5eb58d8cbf7f08b2457144e1d8598deb5eb58d8cbf7f08b2457144e1d85
Frame ID: 4A3657996A115375185F98270103AD72
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
rucofresena.com/mtbtt/ |
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
rucofresena.com/mtbtt/File/ |
252 KB 252 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtb-logo.svg
rucofresena.com/mtbtt/File/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtb-equalhousinglender.svg
rucofresena.com/mtbtt/File/ |
230 B 475 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtb-entrust.svg
rucofresena.com/mtbtt/File/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mandtbaltoweb-book.woff
rucofresena.com/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mandtpg-iconfont.woff
rucofresena.com/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mandtbaltoweb-medium.woff
rucofresena.com/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: M&T Bank (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
rucofresena.com
200.35.157.31
16a3cbe0237c853cc620421a2de41bc0c4e87faa34ebe23710ae97c9a066bad7
5f5b0d9f678fe446631a33a4cbbe891a01b0ed972143702e67ae6617367096ac
7f5aaca90325b7e66f37572d6d52eb27a24ac044518bc5f8a7cca48020f78865
b2ef3bd17aa6bc2daa7b1209f7848b30c64f3068e43162b09a216639ab430ce5
d58eb2802f72d0c6b1d944a1335e8fb914af44b51fe16097aad994c15b8cfbad