r1w.ru
Open in
urlscan Pro
78.37.107.36
Malicious Activity!
Public Scan
Effective URL: https://r1w.ru/xt/naib.cns/login.php?session_id=Ibxy1FtYkFGefUJ87R0V9gdoC4HGqAX6F7ZVj5f2VvLSmffj1MZzta33DHATPRc...
Submission: On May 17 via manual from ZA — Scanned from DE
Summary
TLS certificate: Issued by R3 on April 18th 2022. Valid for: 3 months.
This is the only time r1w.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Capitec Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 78.37.107.36 78.37.107.36 | 12389 (ROSTELECO...) (ROSTELECOM-AS) | |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | r1w.ru |
r1w.ru
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
r1w.ru R3 |
2022-04-18 - 2022-07-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://r1w.ru/xt/naib.cns/login.php?session_id=Ibxy1FtYkFGefUJ87R0V9gdoC4HGqAX6F7ZVj5f2VvLSmffj1MZzta33DHATPRcPuloYegdkAfljZq0F
Frame ID: 016D16026C365A719C1882C0A20ADE2D
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
Internet Banking | Capitec BankPage URL History Show full URLs
- https://r1w.ru/xt/naib.cns/cmbe.php Page URL
- https://r1w.ru/xt/naib.cns/login.php?session_id=Ibxy1FtYkFGefUJ87R0V9gdoC4HGqAX6F7ZVj5f2VvL... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://r1w.ru/xt/naib.cns/cmbe.php Page URL
- https://r1w.ru/xt/naib.cns/login.php?session_id=Ibxy1FtYkFGefUJ87R0V9gdoC4HGqAX6F7ZVj5f2VvLSmffj1MZzta33DHATPRcPuloYegdkAfljZq0F Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
cmbe.php
r1w.ru/xt/naib.cns/ |
193 B 499 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
r1w.ru/xt/naib.cns/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default-3.css
r1w.ru/xt/naib.cns/media/ |
55 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui-1.css
r1w.ru/xt/naib.cns/media/ |
15 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default.css
r1w.ru/xt/naib.cns/media/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_main.webp
r1w.ru/xt/naib.cns/media/ |
5 KB 6 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
proceed.webp
r1w.ru/xt/naib.cns/media/ |
184 B 403 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SSL-certificate-seal-ssl-animated.webp
r1w.ru/xt/naib.cns/media/ |
2 KB 2 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-basic-webfont.woff
r1w.ru/xt/naib.cns/media/ |
26 KB 26 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-book-webfont.woff
r1w.ru/xt/naib.cns/media/ |
26 KB 26 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-light-webfont.woff
r1w.ru/xt/naib.cns/media/ |
22 KB 22 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Capitec Bank (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails function| check1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
r1w.ru/ | Name: PHPSESSID Value: 5ljrk7qe5kki86ssm8plj2l6v4 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=604800 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
r1w.ru
78.37.107.36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