URL: https://superradio.mk/wp-includes/images/wlw/cs/
Submission: On April 28 via manual from AU — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 193.29.187.92, located in Romania and belongs to THCPROJECTS, RO. The main domain is superradio.mk.
TLS certificate: Issued by R3 on April 22nd 2022. Valid for: 3 months.
This is the only time superradio.mk was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: BNZ Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
2 193.29.187.92 51177 (THCPROJECTS)
4 2
Apex Domain
Subdomains
Transfer
2 superradio.mk
superradio.mk
8 KB
4 1
Domain Requested by
2 superradio.mk superradio.mk
4 1

This site contains no links.

Subject Issuer Validity Valid
*.goxxmk.com
R3
2022-04-22 -
2022-07-21
3 months crt.sh

This page contains 1 frames:

Primary Page: https://superradio.mk/wp-includes/images/wlw/cs/
Frame ID: C6F1F7CFB26464781AE7FF099446C300
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

BNZ LoginBNZ Logolocked

Detected technologies

Overall confidence: 100%
Detected patterns
  • /wp-(?:content|includes)/

Page Statistics

4
Requests

50 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

8 kB
Transfer

52 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
superradio.mk/wp-includes/images/wlw/cs/
50 KB
8 KB
Document
General
Full URL
https://superradio.mk/wp-includes/images/wlw/cs/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
193.29.187.92 , Romania, ASN51177 (THCPROJECTS, RO),
Reverse DNS
uocer.colevismance.com
Software
LiteSpeed /
Resource Hash
c91db5ca4eb2efd2dcfb8c2ef40faaa4841b679f4f88bf92701c1cad7e4f0b01

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
content-encoding
br
content-length
7539
content-type
text/html
date
Thu, 28 Apr 2022 03:05:32 GMT
last-modified
Thu, 07 Apr 2022 16:39:36 GMT
server
LiteSpeed
vary
Accept-Encoding
serrano.css
superradio.mk/wp-includes/images/wlw/cs/css/
2 KB
558 B
Stylesheet
General
Full URL
https://superradio.mk/wp-includes/images/wlw/cs/css/serrano.css
Requested by
Host: superradio.mk
URL: https://superradio.mk/wp-includes/images/wlw/cs/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
193.29.187.92 , Romania, ASN51177 (THCPROJECTS, RO),
Reverse DNS
uocer.colevismance.com
Software
LiteSpeed /
Resource Hash
f8260d7d44cfb1f8029f9a65067d76476106c2dbf95aab7673a51198ca6b9659

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://superradio.mk/wp-includes/images/wlw/cs/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Thu, 28 Apr 2022 03:05:33 GMT
content-encoding
br
last-modified
Wed, 13 Apr 2022 08:04:12 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
432
expires
Thu, 05 May 2022 03:05:33 GMT
SerranoWeb-Bold.woff2
superradio.mk/wp-includes/images/wlw/cs/css/fonts/
0
0

SerranoWeb-Regular.woff2
superradio.mk/wp-includes/images/wlw/cs/css/fonts/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
superradio.mk
URL
https://superradio.mk/wp-includes/images/wlw/cs/css/fonts/SerranoWeb-Bold.woff2?v=1c25c2c065
Domain
superradio.mk
URL
https://superradio.mk/wp-includes/images/wlw/cs/css/fonts/SerranoWeb-Regular.woff2?v=5b6826770c

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: BNZ Bank (Banking)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

superradio.mk
superradio.mk
193.29.187.92
c91db5ca4eb2efd2dcfb8c2ef40faaa4841b679f4f88bf92701c1cad7e4f0b01
f8260d7d44cfb1f8029f9a65067d76476106c2dbf95aab7673a51198ca6b9659