envious-cow.w5.wpsandbox.pro
Open in
urlscan Pro
54.157.141.105
Malicious Activity!
Public Scan
Effective URL: https://envious-cow.w5.wpsandbox.pro/alpha2/gr/
Submission: On June 14 via manual from GR — Scanned from DE
Summary
TLS certificate: Issued by Amazon on November 17th 2021. Valid for: a year.
This is the only time envious-cow.w5.wpsandbox.pro was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Alpha Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 54.235.242.85 54.235.242.85 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 2 | 54.157.141.105 54.157.141.105 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-235-242-85.compute-1.amazonaws.com
embarrassed-worm.w5.wpsandbox.pro |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-157-141-105.compute-1.amazonaws.com
envious-cow.w5.wpsandbox.pro |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
wpsandbox.pro
2 redirects
embarrassed-worm.w5.wpsandbox.pro envious-cow.w5.wpsandbox.pro |
2 MB |
1 | 1 |
Domain | Requested by | |
---|---|---|
2 | envious-cow.w5.wpsandbox.pro | 1 redirects |
1 | embarrassed-worm.w5.wpsandbox.pro | 1 redirects |
1 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.w6.wpsandbox.pro Amazon |
2021-11-17 - 2022-12-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://envious-cow.w5.wpsandbox.pro/alpha2/gr/
Frame ID: F42DECDD4832CB72710AAC44B9BF9D3C
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
myAlpha WebPage URL History Show full URLs
-
http://embarrassed-worm.w5.wpsandbox.pro/
HTTP 302
https://envious-cow.w5.wpsandbox.pro/alpha2/ HTTP 302
https://envious-cow.w5.wpsandbox.pro/alpha2/gr/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://embarrassed-worm.w5.wpsandbox.pro/
HTTP 302
https://envious-cow.w5.wpsandbox.pro/alpha2/ HTTP 302
https://envious-cow.w5.wpsandbox.pro/alpha2/gr/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
envious-cow.w5.wpsandbox.pro/alpha2/gr/ Redirect Chain
|
2 MB 2 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
451 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
197 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 8 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
font/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
442 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
311 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
350 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
622 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
162 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1006 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
675 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Alpha Bank (Banking)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails object| navigation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
embarrassed-worm.w5.wpsandbox.pro
envious-cow.w5.wpsandbox.pro
54.157.141.105
54.235.242.85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