www.glosav.ru
Open in
urlscan Pro
195.208.25.164
Malicious Activity!
Public Scan
Submission: On April 02 via automatic, source openphish
Summary
This is the only time www.glosav.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 195.208.25.164 195.208.25.164 | 15835 (MAP Mosco...) (MAP Moscow Network Access Point) | |
16 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
glosav.ru
www.glosav.ru |
559 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
16 | www.glosav.ru |
www.glosav.ru
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/login.php?cmd=login_submit&id=3d22e8df85884dd0a87437baf72d784e3d22e8df85884dd0a87437baf72d784e&session=3d22e8df85884dd0a87437baf72d784e3d22e8df85884dd0a87437baf72d784e
Frame ID: F2F20145FD9944588DE35DFDDD6E7860
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/ |
8 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.js
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s1.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s2.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
117 KB 118 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s3.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
46 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s4.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
51 KB 51 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s5.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
87 KB 88 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s6.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
91 KB 91 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s7.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
104 KB 104 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s9.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s10.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s8.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s11.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s12.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ssign.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
www.glosav.ru/bitrix/cache/bx/.lol/Wells/Well/af54bgs45n4hsg5t4j1nh54es1gt5hj41ye41je6d/login/1/T.Goe/ |
414 B 698 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.glosav.ru
195.208.25.164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