www.pampaebank-arg.com
Open in
urlscan Pro
35.174.204.6
Malicious Activity!
Public Scan
Submission: On February 23 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by ZeroSSL RSA Domain Secure Site CA on February 23rd 2023. Valid for: 3 months.
This is the only time www.pampaebank-arg.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de La Pampa (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 35.174.204.6 35.174.204.6 | 14618 (AMAZON-AES) (AMAZON-AES) | |
11 | 1 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-35-174-204-6.compute-1.amazonaws.com
www.pampaebank-arg.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
pampaebank-arg.com
www.pampaebank-arg.com |
942 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | www.pampaebank-arg.com |
www.pampaebank-arg.com
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pampaebank-arg.com ZeroSSL RSA Domain Secure Site CA |
2023-02-23 - 2023-05-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.pampaebank-arg.com/
Frame ID: 703D6B91670E873202ED62CD6C4FA590
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.pampaebank-arg.com/ |
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-responsive.css
www.pampaebank-arg.com/guante/facha/ |
16 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.pampaebank-arg.com/guante/cacha/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logounalinea.png
www.pampaebank-arg.com/guante/cacha/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mans-silhouette.jpg
www.pampaebank-arg.com/guante/cacha/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mailbox-key.jpg
www.pampaebank-arg.com/guante/cacha/ |
6 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
megaphone.jpg
www.pampaebank-arg.com/guante/cacha/ |
7 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
question-mark-1.jpg
www.pampaebank-arg.com/guante/cacha/ |
7 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
directional-sign.jpg
www.pampaebank-arg.com/guante/cacha/ |
4 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chosen.css
www.pampaebank-arg.com/guante/facha/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BackgroundHome.jpg
www.pampaebank-arg.com/guante/cacha/ |
882 KB 882 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de La Pampa (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.pampaebank-arg.com
35.174.204.6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