bcpzonasegural.vnp-pe.com
Open in
urlscan Pro
50.3.237.63
Malicious Activity!
Public Scan
Submission Tags: falconsandbox
Submission: On October 12 via api from US
Summary
This is the only time bcpzonasegural.vnp-pe.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de Crédito del Perú (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 50.3.237.63 50.3.237.63 | 62904 (EONIX-COM...) (EONIX-COMMUNICATIONS-ASBLOCK-62904) | |
12 | 1 |
ASN62904 (EONIX-COMMUNICATIONS-ASBLOCK-62904, US)
bcpzonasegural.vnp-pe.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
vnp-pe.com
bcpzonasegural.vnp-pe.com |
678 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | bcpzonasegural.vnp-pe.com |
bcpzonasegural.vnp-pe.com
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://bcpzonasegural.vnp-pe.com/app/template/login/waiting.php
Frame ID: C9598B39E6422F95F0D89D1BE3C0D021
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Angular (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+ ng-version="([\d.]+)"/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
waiting.php
bcpzonasegural.vnp-pe.com/app/template/login/ |
34 KB 34 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ooaskdohjhsahd.css
bcpzonasegural.vnp-pe.com/src/estilos/ |
301 KB 302 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
onlogsuasydoa.css
bcpzonasegural.vnp-pe.com/src/estilos/ |
167 KB 167 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_blanco.svg
bcpzonasegural.vnp-pe.com/src/imagen/ |
6 KB 6 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
bcpzonasegural.vnp-pe.com/src/imagen/ |
2 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
user-b.svg
bcpzonasegural.vnp-pe.com/src/imagen/ |
349 B 595 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
big-avatar.svg
bcpzonasegural.vnp-pe.com/src/imagen/ |
1020 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-blue.svg
bcpzonasegural.vnp-pe.com/src/imagen/ |
2 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serialize-0.2.min.js
bcpzonasegural.vnp-pe.com/src/js/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
242863_3_0.973408b83b66574e2bde.woff
bcpzonasegural.vnp-pe.com/src/estilos/fonts/ |
69 KB 69 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icons.a1179978b826d3cbfd6b.woff
bcpzonasegural.vnp-pe.com/src/estilos/fonts/ |
24 KB 24 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
242863_E_0.31e6d7cf733065d39be1.woff
bcpzonasegural.vnp-pe.com/src/estilos/fonts/ |
67 KB 67 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de Crédito del Perú (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| serialize function| sfdsdf45tefgbdfgdf function| ajaxrequest0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bcpzonasegural.vnp-pe.com
50.3.237.63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