www.huajunfinancial.com
Open in
urlscan Pro
210.177.174.178
Malicious Activity!
Public Scan
Submission: On July 23 via automatic, source openphish
Summary
This is the only time www.huajunfinancial.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
21 | 210.177.174.178 210.177.174.178 | 4515 (ERX-STAR ...) (ERX-STAR PCCW IMSBiz) | |
1 2 | 63.215.202.158 63.215.202.158 | 25751 (VALUECLICK) (VALUECLICK - Conversant) | |
1 1 | 89.207.16.137 89.207.16.137 | 25751 (VALUECLICK) (VALUECLICK - Conversant) | |
23 | 3 |
ASN4515 (ERX-STAR PCCW IMSBiz, HK)
www.huajunfinancial.com |
ASN25751 (VALUECLICK - Conversant, Inc., US)
PTR: 158.vip.crm-node1.ams5.cnvr.net
adfarm.mediaplex.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
huajunfinancial.com
www.huajunfinancial.com |
380 KB |
2 |
mediaplex.com
1 redirects
adfarm.mediaplex.com |
1 KB |
1 |
dotomi.com
1 redirects
ams-login.dotomi.com |
362 B |
0 |
superfish.com
Failed
www.superfish.com Failed |
|
23 | 4 |
Domain | Requested by | |
---|---|---|
21 | www.huajunfinancial.com |
www.huajunfinancial.com
|
2 | adfarm.mediaplex.com |
1 redirects
www.huajunfinancial.com
|
1 | ams-login.dotomi.com | 1 redirects |
0 | www.superfish.com Failed |
text
|
23 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
online.wellsfargo.com |
www.wellsfargo.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.huajunfinancial.com/login/onlinebanking/details.html
Frame ID: 9D0475DB0A75FD4E7C6749525D460D39
Requests: 24 HTTP requests in this frame
Screenshot
Detected technologies
CentOS (Operating Systems) ExpandDetected patterns
- headers server /CentOS/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Lightbox (JavaScript Libraries) Expand
Detected patterns
- script /lightbox.*\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui.*\.js/i
Page Statistics
21 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Banking
Search URL Search Domain Scan URL
Title: Loans & Credit
Search URL Search Domain Scan URL
Title: Insurance
Search URL Search Domain Scan URL
Title: Investing
Search URL Search Domain Scan URL
Title: Online Banking Enrollment
Search URL Search Domain Scan URL
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Title: Privacy, Security and Legal
Search URL Search Domain Scan URL
Title: Online Access Agreement
Search URL Search Domain Scan URL
Title: Security Questions Overview
Search URL Search Domain Scan URL
Title: Help
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 22- http://adfarm.mediaplex.com/ad/bk/994-1668-2054-5?COL01STO=1&Unique_ID=11201505250225211793504995 HTTP 302
- http://ams-login.dotomi.com/commonid/match?rurl=http%3A%2F%2Fadfarm.mediaplex.com%2Fad%2Fbk%2F994-1668-2054-5%3Fmpu_token%3DAAAFsbHE7j6NDwAFCY46AAAAAAA%26COL01STO%3D1%26Unique_ID%3D11201505250225211793504995&user_token=AAAFsbHE7j6NDwAFCY46AAAAAAA&tok=lPssmtlHL5A%3D HTTP 302
- http://adfarm.mediaplex.com/ad/bk/994-1668-2054-5?mpu_token=AAAFsbHE7j6NDwAFCY46AAAAAAA&COL01STO=1&Unique_ID=11201505250225211793504995&status=-5
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
details.html
www.huajunfinancial.com/login/onlinebanking/ |
23 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wfwiblib.js
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
61 KB 61 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
214 KB 214 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.js
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
32 KB 32 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
util.js
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
23 KB 23 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
async-keepalive.css
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
59 B 308 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
async-keepalive.js
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
3 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
publicsite.css
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
13 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_62sq.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
616 B 868 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
43 B 293 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enroll-lightbox.js
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
2 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
close_lb_weak.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
152 B 403 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mediaplexROI.js
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
3 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
994-1668-2054-5
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/ |
49 B 315 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
left_nav_dot.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/images/ |
348 B 348 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
caret_header_left.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/images/ |
353 B 353 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tab_bottom.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/images/ |
346 B 346 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
selected_tab.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/images/ |
348 B 348 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
unselected_tab.jpg
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/images/ |
350 B 350 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
new_search_corner.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/images/ |
353 B 353 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_blueslice.gif
www.huajunfinancial.com/login/onlinebanking/Wells%20Fargo_files/images/ |
349 B 349 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sf_conduit.jsp
www.superfish.com/ws/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
994-1668-2054-5
adfarm.mediaplex.com/ad/bk/ Redirect Chain
|
49 B 605 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.superfish.com
- URL
- https://www.superfish.com/ws/sf_conduit.jsp?dlsource=fastestchrome&CTID=1_2015-01&userId=fastest_000_fastestchrome_1_2015-01_
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)96 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| wfOpenWin function| showPopUpMsg function| hidePopupMessage function| hasTryCatch number| calculatorGlobalMonthlyTargetAmount number| calculatorGlobalTargetAmount function| changeDisplayState function| showCalculator function| toggleAllCalculator function| showAllCalculator function| hideAllCalculator function| toggleObject function| createCalculator function| roundDec function| floorDec function| shiftRight function| getCommaDelimitedNumberAsString function| stripCommas function| stripBlanks function| validateCalculatorForm function| calculateMonthlyAmounts function| calculateTargetAmounts function| doResults function| doCalculate function| doSetAmount function| clearMonthlyAmountTextField function| clearTargetAmountTextField object| months object| dayz object| leaddaysDB object| holidayDB object| sysdate undefined| sendonDate undefined| deliveronDate undefined| lead number| daysahead number| dayspast undefined| nextMonth undefined| previousMonth undefined| startDate object| firstEverAvailableStartDate object| calendarFixedStartDate boolean| isYearFormatYY undefined| sourceElement function| getFirstDay function| getMonthLen function| showCalendar function| showAllCalendar function| hideAllCalendar function| formatDate function| toggleAllCalendar function| createCalendar function| populateNavigation function| populateTables function| deleteTable function| populateTable function| chooseDate function| setSelectabledate function| formatDayofmonth function| formatMonthofyear function| day function| isToday function| isTomorrow function| isWeekend function| isPast function| isSelectable function| formatDay function| nextMonthAvailable function| previousMonthAvailable function| nextYearAvailable function| previousYearAvailable boolean| isCSS boolean| isW3C boolean| isIE4 boolean| isNN4 boolean| isIE6CSS function| initDHTMLAPI function| seekLayer function| getRawObject function| getObject function| show function| hide object| win function| popup function| newWindow function| addEvent function| $ function| jQuery function| recordLinkClick function| ROItag object| mpt string| mediapleximgreq string| servingprotocol string| adserver string| imgAttributes string| pseudoUniqueId0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
adfarm.mediaplex.com
ams-login.dotomi.com
www.huajunfinancial.com
www.superfish.com
www.superfish.com
210.177.174.178
63.215.202.158
89.207.16.137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