bronus.uz
Open in
urlscan Pro
5.182.26.11
Malicious Activity!
Public Scan
Effective URL: http://bronus.uz/wrs/wrs123/secure/dd489f3da/signin.php?session=646464336235
Submission: On October 22 via api from US — Scanned from DE
Summary
This is the only time bronus.uz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 11 | 5.182.26.11 5.182.26.11 | 35682 (BESTINTER...) (BESTINTERNETSOLUTION-AS) | |
9 | 1 |
ASN35682 (BESTINTERNETSOLUTION-AS, UZ)
PTR: host2.eskiz.uz
bronus.uz |
Domain | Requested by | |
---|---|---|
11 | bronus.uz |
2 redirects
bronus.uz
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://bronus.uz/wrs/wrs123/secure/dd489f3da/signin.php?session=646464336235
Frame ID: 53A7E806E445519EA5858EAADD95EAB4
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Chase OnlinePage URL History Show full URLs
-
http://bronus.uz/wrs/wrs123/secure/dd489f3da
HTTP 301
http://bronus.uz/wrs/wrs123/secure/dd489f3da/ HTTP 302
http://bronus.uz/wrs/wrs123/secure/dd489f3da/signin.php?session=646464336235 Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
AngularJS (JavaScript Frameworks) Expand
Detected patterns
- \bangular.{0,32}\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bronus.uz/wrs/wrs123/secure/dd489f3da
HTTP 301
http://bronus.uz/wrs/wrs123/secure/dd489f3da/ HTTP 302
http://bronus.uz/wrs/wrs123/secure/dd489f3da/signin.php?session=646464336235 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
signin.php
bronus.uz/wrs/wrs123/secure/dd489f3da/ Redirect Chain
|
16 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blue-ui.css
bronus.uz/wrs/wrs123/secure/dd489f3da/style/css/ |
396 KB 52 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logon.css
bronus.uz/wrs/wrs123/secure/dd489f3da/style/css/ |
128 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
bronus.uz/wrs/wrs123/secure/dd489f3da/style/js/ |
163 KB 58 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
bronus.uz/wrs/wrs123/secure/dd489f3da/style/js/ |
286 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.min.js
bronus.uz/wrs/wrs123/secure/dd489f3da/style/js/ |
49 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wordmark-white.svg
bronus.uz/wrs/wrs123/secure/dd489f3da/style/img/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.jpeg
bronus.uz/wrs/wrs123/secure/dd489f3da/style/img/ |
38 KB 39 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dcefont.woff
bronus.uz/wrs/wrs123/secure/dd489f3da/style/img/ |
53 KB 53 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| angular function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bronus.uz
5.182.26.11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