www.magictransusa.com Open in urlscan Pro
64.91.245.246  Malicious Activity! Public Scan

Submitted URL: https://www.magictransusa.com/js/online/
Effective URL: https://www.magictransusa.com/js/online/signin.php
Submission: On November 28 via manual from PH

Summary

This website contacted 3 IPs in 1 countries across 2 domains to perform 3 HTTP transactions. The main IP is 64.91.245.246, located in Lansing, United States and belongs to LIQUIDWEB, US. The main domain is www.magictransusa.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on October 30th 2020. Valid for: 3 months.
This is the only time www.magictransusa.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Metrobank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 2 64.91.245.246 32244 (LIQUIDWEB)
2 107.162.152.249 55002 (DEFENSE-NET)
3 3
Apex Domain
Subdomains
Transfer
2 metrobank.com.ph
onlinebanking.metrobank.com.ph
648 KB
2 magictransusa.com
www.magictransusa.com
20 KB
3 2
Domain Requested by
2 onlinebanking.metrobank.com.ph www.magictransusa.com
2 www.magictransusa.com 1 redirects
3 2

This site contains no links.

Subject Issuer Validity Valid
magictransusa.com
Let's Encrypt Authority X3
2020-10-30 -
2021-01-28
3 months crt.sh
onlinebanking.metrobank.com.ph
GlobalSign Extended Validation CA - SHA256 - G3
2019-07-10 -
2021-07-10
2 years crt.sh

This page contains 1 frames:

Primary Page: https://www.magictransusa.com/js/online/signin.php
Frame ID: C857639ADD1B777E55E19EAB06D3E93A
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.magictransusa.com/js/online/ HTTP 302
    https://www.magictransusa.com/js/online/signin.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

1
Countries

668 kB
Transfer

719 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.magictransusa.com/js/online/ HTTP 302
    https://www.magictransusa.com/js/online/signin.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request signin.php
www.magictransusa.com/js/online/
Redirect Chain
  • https://www.magictransusa.com/js/online/
  • https://www.magictransusa.com/js/online/signin.php
63 KB
20 KB
Document
General
Full URL
https://www.magictransusa.com/js/online/signin.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
64.91.245.246 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
host.magicprinting.com
Software
Apache / PHP/5.6.40
Resource Hash
eb24635be1749a8010105c502ba577be7b18a6367e404f48c7a7c8ae4f8ee2fa

Request headers

:method
GET
:authority
www.magictransusa.com
:scheme
https
:path
/js/online/signin.php
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 28 Nov 2020 08:53:52 GMT
server
Apache
x-powered-by
PHP/5.6.40
cache-control
max-age=600
expires
Sat, 28 Nov 2020 09:03:52 GMT
vary
Accept-Encoding,User-Agent
content-encoding
gzip
content-length
19971
content-type
text/html; charset=UTF-8

Redirect headers

date
Sat, 28 Nov 2020 08:53:52 GMT
server
Apache
x-powered-by
PHP/5.6.40
location
signin.php
cache-control
max-age=600
expires
Sat, 28 Nov 2020 09:03:52 GMT
vary
User-Agent
content-length
0
content-type
text/html; charset=UTF-8
b2a2e35cd37c19553fd06a07eb4ab217.png
onlinebanking.metrobank.com.ph/
24 KB
25 KB
Image
General
Full URL
https://onlinebanking.metrobank.com.ph/b2a2e35cd37c19553fd06a07eb4ab217.png
Requested by
Host: www.magictransusa.com
URL: https://www.magictransusa.com/js/online/signin.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
107.162.152.249 , United States, ASN55002 (DEFENSE-NET, US),
Reverse DNS
Software
/
Resource Hash
f166b723f0dc67ce89c2ef11f623bb85fbd69d3657a2a5d3a336714071bf2eab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains;

Request headers

Referer
https://www.magictransusa.com/js/online/signin.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 28 Nov 2020 08:53:27 GMT
Via
1.1 fra1-bit24
Referrer-Policy
strict-origin-when-cross-origin
Last-Modified
Thu, 26 Nov 2020 01:56:45 GMT
ETag
"5fbf0b5d-61e7"
Strict-Transport-Security
max-age=31536000; includeSubdomains;
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
25063
b93202958cb9ef4782f231e431f02c08.jpg
onlinebanking.metrobank.com.ph/
622 KB
623 KB
Image
General
Full URL
https://onlinebanking.metrobank.com.ph/b93202958cb9ef4782f231e431f02c08.jpg
Requested by
Host: www.magictransusa.com
URL: https://www.magictransusa.com/js/online/signin.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
107.162.152.249 , United States, ASN55002 (DEFENSE-NET, US),
Reverse DNS
Software
/
Resource Hash
10d6bd3a8ad98807b5e1dfc9d35f7fe06c8c1c7833f5b7989e8d30e21acb98f1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains;

Request headers

Referer
https://www.magictransusa.com/js/online/signin.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 28 Nov 2020 08:53:27 GMT
Via
1.1 fra1-bit24
Referrer-Policy
strict-origin-when-cross-origin
Last-Modified
Thu, 26 Nov 2020 02:09:35 GMT
ETag
"5fbf0e5f-9b89b"
Strict-Transport-Security
max-age=31536000; includeSubdomains;
Content-Type
image/jpeg
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
637083
truncated
/
9 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
411ec5f8f5db240e6bc6c52eeb23079bc850ea4b066d04e64cc83c874a4b3c98

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Metrobank (Banking)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated

0 Cookies