spaka.site
Open in
urlscan Pro
2606:4700:30::681c:1e2e
Malicious Activity!
Public Scan
Effective URL: https://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/login.php?spar=7370616b612e736974657370616b612e73...
Submission: On May 29 via api from DE
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on May 26th 2019. Valid for: a year.
This is the only time spaka.site was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2606:4700:30:... 2606:4700:30::681c:1f2e | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 17 | 2606:4700:30:... 2606:4700:30::681c:1e2e | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
spaka.site |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
spaka.site |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
spaka.site
4 redirects
spaka.site |
413 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
19 | spaka.site |
4 redirects
spaka.site
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-05-26 - 2020-05-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/login.php?spar=7370616b612e736974657370616b612e736974657370616b612e73697465=0&sessionid=7370616b612e73697465
Frame ID: E58880A4E810578B9B43386C4BC95EA9
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://spaka.site/
HTTP 301
https://spaka.site/ Page URL
-
https://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o
HTTP 301
http://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/ HTTP 301
https://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/ HTTP 302
https://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/login.php?spar=7370616b612e73... Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://spaka.site/
HTTP 301
https://spaka.site/ Page URL
-
https://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o
HTTP 301
http://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/ HTTP 301
https://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/ HTTP 302
https://spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/login.php?spar=7370616b612e736974657370616b612e736974657370616b612e73697465=0&sessionid=7370616b612e73697465 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://spaka.site/ HTTP 301
- https://spaka.site/
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
spaka.site/ Redirect Chain
|
1 B 455 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/ Redirect Chain
|
22 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
functions.js
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assets/js/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sparkassestyle.css
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/ |
544 KB 66 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assets/js/ |
85 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
log.jpg
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
secure.jpg
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/ |
22 KB 22 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
diewelt.png
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
IHKberlin.png
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/ |
39 KB 40 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
T%C3%BCv.jpg
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/ |
6 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iconhome.jpg
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/ |
23 KB 24 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Sparkasse_web_Rg.woff
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/internetfiliale/fonts/ |
39 KB 39 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Sparkasse_web_Bd.woff
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/internetfiliale/fonts/ |
39 KB 38 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pictos-if.woff
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/assetcss/internetfiliale/fonts/ |
89 KB 89 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
timezone.php
spaka.site/mybanking/fjrypina2et1z7v49kdbq3wmucsh680lxg5o/ |
0 55 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Sparkasse (Banking)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| Aes object| Base64 object| Utf8 string| he12p string| gea string| output string| ctrTxt function| $ function| jQuery2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
spaka.site/ | Name: PHPSESSID Value: 0tl77thc4lngqfpuf0um7idjo7 |
|
.spaka.site/ | Name: __cfduid Value: d84ac902ec3bcf11243b5bbbca1858efd1559123887 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
spaka.site
2606:4700:30::681c:1e2e
2606:4700:30::681c:1f2e
084fbd2d06e01c892e768513dc9954237e0875030366b5d4b9e31b76b0e4dd48
339b1bf5655d2d57d5ea8fda878e1cd6a78080647e36e241d52456fa039f0a97
4aed1efbbe0bb753684998625ef250fb40086fa7806930d159d80499a5aaf753
581672c1b52348baf0503666a693f8cbcdf63916cea8a798b0a3c98c677d6b5d
58e82d45f5fd5f051b4b2c5f62504f0b5033d418a3f13c55bd37ff99398536c6
622cdddf9135812f42c5b6396df2b08c836819bb84d0bcd9e82e779d0a4ad469
6de2594850a4d1576aadd021efd5c11a1ca169556c06c9cdb4b0f211ab26eb82
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
9ab0dfe998556e29c04841d088bd8fb9bbdb84f844223765492d0b4c98ad6ba7
a9ad5dac2a400c1fb324e09df57325568e98772618ff818ca5344b171c834aa2
d3d6aefec9d4c8294072e8a246a45716badf57373b71990f6254b4c480245288
e3a096177fdb67dc609921050caec415a389d683674be529f2ba91f6e5514638
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855