viakra.my.id
Open in
urlscan Pro
103.29.214.171
Malicious Activity!
Public Scan
Effective URL: https://viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/dashboard
Submission: On May 07 via manual from US
Summary
TLS certificate: Issued by R3 on March 8th 2021. Valid for: 3 months.
This is the only time viakra.my.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 11 | 103.29.214.171 103.29.214.171 | 58377 (SENTRACOL...) (SENTRACOLO-AS-ID Sentra Niaga Solusindo) | |
1 | 2606:4700:303... 2606:4700:3035::ac43:c763 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 2 |
ASN58377 (SENTRACOLO-AS-ID Sentra Niaga Solusindo, PT., ID)
PTR: iix21.sharehostserver.com
viakra.my.id |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
viakra.my.id
3 redirects
viakra.my.id |
1000 KB |
1 |
js-codes.com
js-codes.com |
2 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
11 | viakra.my.id |
3 redirects
viakra.my.id
|
1 | js-codes.com |
viakra.my.id
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
viakra.my.id R3 |
2021-03-08 - 2021-06-06 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-03 - 2021-08-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/dashboard
Frame ID: D7F766B10EB10A31317B4A0639853B9A
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://viakra.my.id/chase/xWanted%20V4/php/account/login
HTTP 301
https://viakra.my.id/chase/xWanted%20V4/php/account/login/ HTTP 302
https://viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/index HTTP 302
https://viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/dashboard Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://viakra.my.id/chase/xWanted%20V4/php/account/login
HTTP 301
https://viakra.my.id/chase/xWanted%20V4/php/account/login/ HTTP 302
https://viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/index HTTP 302
https://viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/dashboard Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
dashboard
viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/ Redirect Chain
|
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.css
viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/styles/ |
23 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr.min.js
js-codes.com/modernizr/2.9.1/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/scripts/ |
85 KB 86 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.ccvalid.js
viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/scripts/ |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.min.js
viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/scripts/ |
8 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
white_logo.svg
viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/pics/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1024_bg.jpg
viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/pics/ |
806 KB 812 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lighter_font.woff
viakra.my.id/chase/xWanted%20V4/php/account/login/onreviwer/fonts/ |
53 KB 53 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| html5 object| Modernizr function| $ function| jQuery object| $jscomp1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
viakra.my.id/ | Name: PHPSESSID Value: 6d9daf0141bdaf66f2c2e087ff9c37d1 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
js-codes.com
viakra.my.id
103.29.214.171
2606:4700:3035::ac43:c763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