curiouscardinal.build067.wpsandbox.app Open in urlscan Pro
2606:4700:10::ac43:457  Malicious Activity! Public Scan

URL: https://curiouscardinal.build067.wpsandbox.app/login/meine/
Submission: On December 13 via api from IE — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 2606:4700:10::ac43:457, located in United States and belongs to CLOUDFLARENET, US. The main domain is curiouscardinal.build067.wpsandbox.app.
TLS certificate: Issued by R3 on December 1st 2022. Valid for: 3 months.
This is the only time curiouscardinal.build067.wpsandbox.app was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: ING Group (Banking)

Domain & IP information

IP Address AS Autonomous System
1 2606:4700:10:... 13335 (CLOUDFLAR...)
3 2
Apex Domain
Subdomains
Transfer
1 wpsandbox.app
curiouscardinal.build067.wpsandbox.app
176 KB
3 1
Domain Requested by
1 curiouscardinal.build067.wpsandbox.app curiouscardinal.build067.wpsandbox.app
3 1

This site contains no links.

Subject Issuer Validity Valid
*.build067.wpsandbox.app
R3
2022-12-01 -
2023-03-01
3 months crt.sh

This page contains 2 frames:

Primary Page: https://curiouscardinal.build067.wpsandbox.app/login/meine/
Frame ID: 606CC03A6C86ABAEDA95E2B8CDA946C7
Requests: 8 HTTP requests in this frame

Frame: https://curiouscardinal.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1670904000
Frame ID: 2F5028FE5FE578DE19AF1827B9228828
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

ING Login

Page Statistics

3
Requests

33 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

266 kB
Transfer

466 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
curiouscardinal.build067.wpsandbox.app/login/meine/
314 KB
176 KB
Document
General
Full URL
https://curiouscardinal.build067.wpsandbox.app/login/meine/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::ac43:457 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
23d8e6988c9b90b05f3814517a6880a23e029d389ecf313622b2012d2d1824a5

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
778cef6b1ea29b21-FRA
content-encoding
br
content-type
text/html
date
Tue, 13 Dec 2022 07:20:06 GMT
last-modified
Thu, 27 Oct 2022 05:19:00 GMT
server
cloudflare
vary
Accept-Encoding
x-hostname
gpc067-node3.us-midwest-1.nxcli.net
x-robots-tag
noindex
x-served-by
gpc067-node3
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1470546a5f8d7a68deb045a9f3be48c3fa818c53c0b4f8c854d6acdec64aa225

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
16 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9a214e9df938fbc09d96e47ae4dbe031d7a581647a87c38ec371bc2a2d4dc7cf

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
30 KB
30 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3a135f82b209a59959b162a1fbc9b0b38856d1332af286f86046b06357b3811e

Request headers

Referer
Origin
https://curiouscardinal.build067.wpsandbox.app
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Content-Type
application/octet-stream
truncated
/
29 KB
29 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f74c344733a85af20d2754b208f12309e2a30c591795d0881cb0ad94c4be6155

Request headers

Referer
Origin
https://curiouscardinal.build067.wpsandbox.app
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Content-Type
application/octet-stream
truncated
/
32 KB
32 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
305948d72ce8577a386f77079dacdb6841f18668f64cc7865a196a0624e5b5a8

Request headers

Referer
Origin
https://curiouscardinal.build067.wpsandbox.app
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Content-Type
application/font-woff
truncated
/
44 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fb6ebe23316c03fd8d25e871bfdd9c41eb77e14115f5a01e3e0d97b94617779e

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Content-Type
image/png
email-decode.min.js
curiouscardinal.build067.wpsandbox.app/cdn-cgi/scripts/5c5dd728/cloudflare-static/
0
0

invisible.js
curiouscardinal.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/b/scripts/alpha/ Frame 2F50
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
curiouscardinal.build067.wpsandbox.app
URL
https://curiouscardinal.build067.wpsandbox.app/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Domain
curiouscardinal.build067.wpsandbox.app
URL
https://curiouscardinal.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1670904000

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: ING Group (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| oncontentvisibilityautostatechange

0 Cookies

2 Console Messages

Source Level URL
Text
security error URL: https://curiouscardinal.build067.wpsandbox.app/login/meine/
Message:
Refused to load the script 'https://curiouscardinal.build067.wpsandbox.app/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js' because it violates the following Content Security Policy directive: "script-src 'unsafe-inline' data:". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.
security error
Message:
Refused to load the script 'https://curiouscardinal.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1670904000' because it violates the following Content Security Policy directive: "script-src 'unsafe-inline' data:". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.