osmstays.com
Open in
urlscan Pro
103.76.228.2
Malicious Activity!
Public Scan
Submission: On July 22 via api from TW
Summary
This is the only time osmstays.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 103.76.228.2 103.76.228.2 | 394695 (PUBLIC-DO...) (PUBLIC-DOMAIN-REGISTRY) | |
5 | 23.210.248.51 23.210.248.51 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
12 | 2 |
ASN394695 (PUBLIC-DOMAIN-REGISTRY, US)
PTR: cs-mum-4.webhostbox.net
osmstays.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
osmstays.com
osmstays.com |
117 KB |
5 |
chasecdn.com
static.chasecdn.com |
324 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
7 | osmstays.com |
osmstays.com
|
5 | static.chasecdn.com |
osmstays.com
|
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
static.chasecdn.com Entrust Certification Authority - L1M |
2020-01-27 - 2021-01-27 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://osmstays.com/demo/core3/
Frame ID: BFF5217A1E8408624A8CAF824D341458
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
osmstays.com/demo/core3/ |
17 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logon.css
static.chasecdn.com/web/2018.04.08-234/logon/assets/ |
107 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
blue-ui.css
static.chasecdn.com/web/2018.04.08-234/common/assets/ |
380 KB 37 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
r.svg
osmstays.com/demo/core3/review/views/images/ |
681 B 952 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
osmstays.com/demo/core3/review/views/assest/js/ |
85 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.min.js
osmstays.com/demo/core3/review/views/assest/js/validate/ |
23 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
additional-methods.min.js
osmstays.com/demo/core3/review/views/assest/js/validate/ |
18 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.inputmask.bundle.js
osmstays.com/demo/core3/review/views/assest/js/inputmask/ |
214 KB 56 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glob.js
osmstays.com/demo/core3/review/views/assest/js/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wordmark-white.svg
static.chasecdn.com/web/2018.04.08-234/common/assets/img/logos/ |
1 KB 1006 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background.desktop.day.4.jpeg
static.chasecdn.com/content/geo-images/images/ |
245 KB 246 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dcefont.woff
static.chasecdn.com/web/2018.04.08-234/common/assets/fonts/ |
51 KB 29 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Inputmask undefined| card1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
osmstays.com/ | Name: PHPSESSID Value: b92ashia1uj7525nhih9t2gtb2 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
osmstays.com
static.chasecdn.com
103.76.228.2
23.210.248.51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