www.al-nidaa.com.my
Open in
urlscan Pro
124.217.242.3
Malicious Activity!
Public Scan
Effective URL: http://www.al-nidaa.com.my/seruan//administrator/components/com_templates/helpers/index.html
Submission: On September 12 via automatic, source openphish
Summary
This is the only time www.al-nidaa.com.my was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 122.155.201.180 122.155.201.180 | 9931 (CAT-AP Th...) (CAT-AP The Communication Authoity of Thailand) | |
3 | 124.217.242.3 124.217.242.3 | 45839 (SHINJIRU-...) (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd) | |
11 | 159.53.42.34 159.53.42.34 | 7743 (AS-7743) (AS-7743 - JPMorgan Chase & Co.) | |
14 | 2 |
ASN9931 (CAT-AP The Communication Authoity of Thailand, CAT, TH)
122.155.201.180 |
ASN45839 (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd, MY)
PTR: zebra2.ip-asia.com
www.al-nidaa.com.my |
ASN7743 (AS-7743 - JPMorgan Chase & Co., US)
chaseonline.chase.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
chase.com
chaseonline.chase.com |
23 KB |
3 |
al-nidaa.com.my
www.al-nidaa.com.my |
47 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
11 | chaseonline.chase.com |
www.al-nidaa.com.my
|
3 | www.al-nidaa.com.my |
www.al-nidaa.com.my
|
14 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.chase.com |
chaseonline.chase.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
apply.chase.com Symantec Class 3 EV SSL CA - G3 |
2017-07-24 - 2018-08-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.al-nidaa.com.my/seruan//administrator/components/com_templates/helpers/index.html
Frame ID: 7761.1
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://122.155.201.180/mail/test/direct.php
HTTP 302
http://www.al-nidaa.com.my/seruan//administrator/components/com_templates/helpers/index.html Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Windows Server (Operating Systems) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
IIS (Web Servers) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
Page Statistics
9 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Forgot your User ID and Password?
Search URL Search Domain Scan URL
Title: Report Fraud and E-mail scams
Search URL Search Domain Scan URL
Title: Learn how to protect yourself
Search URL Search Domain Scan URL
Title: Find out how we protect you
Search URL Search Domain Scan URL
Title: Read tips for safe online shopping
Search URL Search Domain Scan URL
Title: Upgrade Your Browser by November 30.
Search URL Search Domain Scan URL
Title: Enroll Now
Search URL Search Domain Scan URL
Title: See the Demo
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://122.155.201.180/mail/test/direct.php
HTTP 302
http://www.al-nidaa.com.my/seruan//administrator/components/com_templates/helpers/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
www.al-nidaa.com.my/seruan//administrator/components/com_templates/helpers/ Redirect Chain
|
12 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
www.al-nidaa.com.my/seruan//administrator/components/com_templates/helpers/ |
11 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ChaseNew.gif
chaseonline.chase.com/images// |
742 B 742 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
validator.js
www.al-nidaa.com.my/seruan//administrator/components/com_templates/helpers/ |
24 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
locker.gif
chaseonline.chase.com/images/ |
79 B 79 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spacer.gif
chaseonline.chase.com/images/ |
43 B 43 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logon.gif
chaseonline.chase.com/images/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
headerback.gif
chaseonline.chase.com/Themes/default/images/ |
323 B 323 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
headertext.gif
chaseonline.chase.com/Themes/default-col/images/ |
580 B 580 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bk-dash.gif
chaseonline.chase.com/content/ecpweb/sso/image/ |
53 B 53 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sculptured-octagon.jpg
chaseonline.chase.com/content/ecpweb/sso/image/ |
12 KB 12 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blue-link-arrow.gif
chaseonline.chase.com/content/ecpweb/sso/image/ |
50 B 50 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ob-button-enroll-now.gif
chaseonline.chase.com/content/ecpweb/sso/image/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ob-button-see-the-demo.gif
chaseonline.chase.com/content/ecpweb/sso/image/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking) Generic (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
chaseonline.chase.com
www.al-nidaa.com.my
122.155.201.180
124.217.242.3
159.53.42.34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