brigthsteps.com
Open in
urlscan Pro
102.130.115.251
Malicious Activity!
Public Scan
Effective URL: http://brigthsteps.com/Signin.htm?ScrPg=%27..%27%27..%27&ACCT.x=ID-DL=WF324=%27..%27/
Submission Tags: @ecarlesi threat phishing wellsfargo Search All
Submission: On February 06 via api from IT — Scanned from IT
Summary
This is the only time brigthsteps.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 102.130.115.251 102.130.115.251 | 328364 (Host-Afri...) (Host-Africa-AS) | |
1 | 212.23.222.194 212.23.222.194 | 201814 (MEVSPACE) (MEVSPACE) | |
10 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
brigthsteps.com
1 redirects
brigthsteps.com |
59 KB |
1 |
strox.nl
strox.nl |
599 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
10 | brigthsteps.com |
1 redirects
brigthsteps.com
|
1 | strox.nl |
brigthsteps.com
|
10 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
strox.nl R3 |
2023-12-05 - 2024-03-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://brigthsteps.com/Signin.htm?ScrPg=%27..%27%27..%27&ACCT.x=ID-DL=WF324=%27..%27/
Frame ID: 289B5AE4D7354A8D25C27938A584F82D
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Sign inPage URL History Show full URLs
-
http://brigthsteps.com/
HTTP 302
http://brigthsteps.com/Signin.htm?ScrPg=%27..%27%27..%27&ACCT.x=ID-DL=WF324=%27..%27/ Page URL
Detected technologies
Modernizr (JavaScript Libraries) ExpandDetected patterns
- ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://brigthsteps.com/
HTTP 302
http://brigthsteps.com/Signin.htm?ScrPg=%27..%27%27..%27&ACCT.x=ID-DL=WF324=%27..%27/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Signin.htm
brigthsteps.com/ Redirect Chain
|
16 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csspage2.css
brigthsteps.com/Signin_files/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modernizr.min.js
brigthsteps.com/Signin_files/ |
11 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.min.css
brigthsteps.com/Signin_files/ |
58 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
brigthsteps.com/Signin_files/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
brigthsteps.com/Signin_files/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.jpg
strox.nl/we_files/pics/ |
599 KB 599 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fa-solid-900.woff2
brigthsteps.com/webfonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fa-solid-900.woff
brigthsteps.com/webfonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fa-solid-900.ttf
brigthsteps.com/webfonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| html5 object| Modernizr function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
brigthsteps.com/ | Name: PHPSESSID Value: 9oisc0es5eb0ltf356546l8gh0 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
brigthsteps.com
strox.nl
102.130.115.251
212.23.222.194
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
3e4af3f39885c55017c51ee4c68ab87c4ecb6af0d9a54417eee33d9db13b036e
52e7c1d2fe8067ebd9cf98b804b44dafa9df7bd513744cebe3c53ada80e41f81
954dd646ba96c8b4af6e0592027e18937cee696eb19a36f40383a2fdd8c0f255
99464ceb71bc9bbdcc72275faefe44f98eb5cbb6b5d8ee665b87b35376f1a96e
d2b82e612d2a812e8be2a57300dab8923c4f2edbe7a799e7da70791b595646fe
d3ee0c954f26a12702c2ad4ca5fc14fa14198eadd59113a5baef17e0c1240ebe