www.almsat.com
Open in
urlscan Pro
95.217.40.222
Malicious Activity!
Public Scan
Submission: On September 12 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 2nd 2020. Valid for: 3 months.
This is the only time www.almsat.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ABSA (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
19 | 95.217.40.222 95.217.40.222 | 24940 (HETZNER-AS) (HETZNER-AS) | |
19 | 1 |
ASN24940 (HETZNER-AS, DE)
PTR: static.222.40.217.95.clients.your-server.de
www.almsat.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
almsat.com
www.almsat.com |
1 MB |
19 | 1 |
Domain | Requested by | |
---|---|---|
19 | www.almsat.com |
www.almsat.com
|
19 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
almsat.com cPanel, Inc. Certification Authority |
2020-08-02 - 2020-10-31 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.almsat.com/scnd/login.jsp.php?session_id_p1uxvDOZbdSb9ITEZFUb06uYdsibQXpgZTOuwDtIQmT05ME4szgsFLrTdK44HtkGn9bUMFCD1wD6jibL
Frame ID: C8DDCE93D3BC0AF69995EC1FAF8DEA4A
Requests: 19 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.jsp.php
www.almsat.com/scnd/ |
25 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.almsat.com/scnd/media/ |
129 KB 130 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
www.almsat.com/scnd/media/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jcaptcha.css
www.almsat.com/scnd/media/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
backbase.js
www.almsat.com/scnd/media/ |
256 KB 256 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-all-base.js
www.almsat.com/scnd/media/ |
479 KB 479 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-red.png
www.almsat.com/scnd/media/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
locale_en.gif
www.almsat.com/scnd/media/ |
70 B 310 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
campaigne_1_ENG.png
www.almsat.com/scnd/media/ |
45 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
campaigne_3_post_golive_EN.jpg
www.almsat.com/scnd/media/ |
82 KB 82 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajax-loader-2.gif
www.almsat.com/scnd/media/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.almsat.com/scnd/media/ |
56 KB 56 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keyboard.js
www.almsat.com/scnd/media/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite-corners-rounded.png
www.almsat.com/scnd/media/ |
246 B 487 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-questionmark-grey_2019.png
www.almsat.com/scnd/media/ |
362 B 603 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keypad-bg.gif
www.almsat.com/scnd/media/ |
439 B 680 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
key-button.gif
www.almsat.com/scnd/media/ |
379 B 620 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keypad-backspace.png
www.almsat.com/scnd/media/ |
209 B 450 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite-icons-bar-status_2019.png
www.almsat.com/scnd/media/ |
643 B 884 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ABSA (Banking)63 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| SOAPEnvelope function| j1_ object| JSONRequest function| JSONRequestError object| bb object| portal object| gadgets object| absa function| triggerModal4Body function| absaGadgetTemplate undefined| onReturn string| siteEnvironment string| s_account object| s function| s_getObjectID function| s_doPlugins function| getMetaContent function| getProps function| getAllProps function| getFirstProp function| addLoadEvent function| OmnitureContactUs function| OmnitureToolUsage function| OmnitureToolUsageComplete function| CustomerAction function| OmnitureSocialClick string| s_code undefined| s_objectID function| s_gi string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in function| s_onload_0 function| check function| onefocused function| twofocused function| threefocused function| addnr1 function| addnr2 function| addnr3 function| addnr4 function| addnr5 function| addnr6 function| addnr7 function| addnr8 function| addnr9 function| addnr0 function| cancel function| GetNow function| $ function| jQuery object| xhtml object| btl function| oldConvert function| oldGetStyle0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.almsat.com
95.217.40.222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