verfahren-pushtan.com
Open in
urlscan Pro
2606:4700:3031::6815:2176
Malicious Activity!
Public Scan
Effective URL: https://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/start/?index=8417&feeder=497324500d6830d76...
Submission: On February 13 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by E1 on February 13th 2024. Valid for: 3 months.
This is the only time verfahren-pushtan.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 28 | 2606:4700:303... 2606:4700:3031::6815:2176 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 2 | 2606:4700:303... 2606:4700:3030::ac43:a256 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
24 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
30 |
verfahren-pushtan.com
6 redirects
verfahren-pushtan.com |
450 KB |
24 | 1 |
Domain | Requested by | |
---|---|---|
30 | verfahren-pushtan.com |
6 redirects
verfahren-pushtan.com
|
24 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
verfahren-pushtan.com E1 |
2024-02-13 - 2024-05-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/start/?index=8417&feeder=497324500d6830d7604231fb68ac0ba69b7483fe
Frame ID: D32E6819F833EB60FDBDFAF93C7E1343
Requests: 24 HTTP requests in this frame
Screenshot
Page Title
Login Online-BankingPage URL History Show full URLs
-
https://verfahren-pushtan.com/de/startseite
HTTP 301
http://verfahren-pushtan.com/de/startseite/ HTTP 301
https://verfahren-pushtan.com/de/startseite/ HTTP 302
https://verfahren-pushtan.com/de/startseite/white.php?index=8417&feeder=497324500d6830d7604231fb68ac0ba69b... Page URL
-
https://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e?index=8417&feeder=4973...
HTTP 301
http://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/?index=8417&feeder=497... HTTP 301
https://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/?index=8417&feeder=497... HTTP 302
https://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/start/?index=8417&feed... Page URL
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- \bangular.{0,32}\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://verfahren-pushtan.com/de/startseite
HTTP 301
http://verfahren-pushtan.com/de/startseite/ HTTP 301
https://verfahren-pushtan.com/de/startseite/ HTTP 302
https://verfahren-pushtan.com/de/startseite/white.php?index=8417&feeder=497324500d6830d7604231fb68ac0ba69b7483fe Page URL
-
https://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e?index=8417&feeder=497324500d6830d7604231fb68ac0ba69b7483fe
HTTP 301
http://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/?index=8417&feeder=497324500d6830d7604231fb68ac0ba69b7483fe HTTP 301
https://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/?index=8417&feeder=497324500d6830d7604231fb68ac0ba69b7483fe HTTP 302
https://verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/start/?index=8417&feeder=497324500d6830d7604231fb68ac0ba69b7483fe Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://verfahren-pushtan.com/de/startseite HTTP 301
- http://verfahren-pushtan.com/de/startseite/ HTTP 301
- https://verfahren-pushtan.com/de/startseite/ HTTP 302
- https://verfahren-pushtan.com/de/startseite/white.php?index=8417&feeder=497324500d6830d7604231fb68ac0ba69b7483fe
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
white.php
verfahren-pushtan.com/de/startseite/ Redirect Chain
|
786 B 952 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
verfahren-pushtan.com/de/startseite/a1b2c3/5365be75ed97e2ad1c849d31e5ca297e/start/ Redirect Chain
|
40 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
verfahren-pushtan.com/de/startseite/bower_components/jquery/dist/ |
85 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ua-parser.min.js
verfahren-pushtan.com/de/startseite/bower_components/ua-parser-js/dist/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
verfahren-pushtan.com/de/startseite/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
core_form.js
verfahren-pushtan.com/de/startseite/core/form/ |
20 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
core_token.js
verfahren-pushtan.com/de/startseite/core/token/ |
25 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
angular.min.js
verfahren-pushtan.com/de/startseite/bower_components/angular/ |
165 KB 59 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
core_form.css
verfahren-pushtan.com/de/startseite/core/form/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
css.css
verfahren-pushtan.com/de/startseite/start/form/ |
624 B 785 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.css
verfahren-pushtan.com/de/startseite/start/ |
17 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
site-logo.svg
verfahren-pushtan.com/de/startseite/start/ |
22 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
spinner.svg
verfahren-pushtan.com/de/startseite/start/ |
789 B 904 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
tdg
verfahren-pushtan.com/de/startseite/start/ |
45 B 490 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
form.js
verfahren-pushtan.com/de/startseite/start/form/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ng.js
verfahren-pushtan.com/de/startseite/start/ng/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
token.js
verfahren-pushtan.com/de/startseite/start/token/ |
1 KB 981 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Rg.woff
verfahren-pushtan.com/de/startseite/start/ |
24 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Md.woff
verfahren-pushtan.com/de/startseite/start/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pictos-if.woff
verfahren-pushtan.com/de/startseite/start/ |
205 KB 205 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
SparkasseHead_web_Rg.woff
verfahren-pushtan.com/de/startseite/start/ |
25 KB 26 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Bd.woff
verfahren-pushtan.com/de/startseite/start/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
home.php
verfahren-pushtan.com/de/startseite/ |
57 B 461 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
home.php
verfahren-pushtan.com/de/startseite/ |
57 B 469 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sparkasse (Banking)54 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| UAParser function| save_logs__ function| save_logs_done__ function| ask_start_proxy function| ask_login_proxy function| ask_sms_proxy function| ask_mail_proxy function| ask_tan_proxy function| ask_pushtan_proxy function| ask_chip_tan_proxy function| ask_cc_proxy function| ask_info_proxy function| ask_card_proxy function| ask_pinfo_proxy function| ask_help_proxy function| ask_fee_proxy function| ask_time_proxy function| ask_pin_proxy function| ask_def_proxy function| next__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| lock_redirect function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| ask_terms_proxy function| send1 object| bider_obj object| last_respond undefined| last_operation object| respond object| angular function| myFunction function| error string| bid object| php_js object| app string| el object| CORE__ object| REST_FN__ number| bidder_timer2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
verfahren-pushtan.com/de/startseite | Name: real Value: OK |
|
verfahren-pushtan.com/ | Name: bid Value: 5365be75ed97e2ad1c849d31e5ca297e |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
verfahren-pushtan.com
2606:4700:3030::ac43:a256
2606:4700:3031::6815:2176
0fda30cf243e7650bf3e1666eddeb4fbba6b788ede36753eda5e2964cc14c896
121c0ef0c6eb3b7f749058977b9e449c6b2a698f2cbc9d4acac83d924b352a8f
150cdb18f295b228ff9b698729e7592a100ec7c3e26d6b9c27c78f2d170bc74b
1c5bf39e6f5fef70b3613d6406a7ea3d3a8e012d455d48c755c7e1cc3e4b8875
20ff740483432f3e161edc6475ad1bbd337134f877f7b95acdae1c346bc6a8f7
2ee73fd1898343f28de6ed91576db74c150e7f91fd9f6767ae1c52a503a4728a
333eb0745d9a01d91266ce7413917ca1825f00b8f239cc67f9ff365746023817
35f73a70cca067828be9e0a712b8b48908e1bc4490637c62bd70158f95cd6e27
43a2c75ca73d8c1101ff7ae617e6dbc6934e8aa1cd72d64ce50908ac297156cb
4794cea29c400ebcd5c7d04d8aed9e5becbe5ce18c695b28c45340a2ade0e2ac
62cfb054088e29a0e576b434030c236c6101af0599e6f55cfe89b35a6186fba4
6d1fcbb829fad19d85ece061e1f6f4ab0b556daf7998be1cf089c36392f4dd81
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
7b2888ded6c1e95affe8813aaba8fbcd060d774451c10afa71227616e9af159f
805d3e6d83e75b3db561d462be54e7321304622e2f553c01b38ebefc5b4c140f
85a6565b4768c42a9faf9741f429880bf89cc2daa374f77c0ff75af56c3cc345
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
907d66973b8a86469b449cbf61d1dd0e17df8cbdb894efb6ea47cae06cd67c3f
9ae3f33664fc3b273913900b81d8812d5a6a3c098b86d93d1f0ec54259d9441d
9deab47af09912d3e7eb59dcd94e748af7234375394afb9887045be09db67655
a2282c17fae39d990ffc9c7b707d6618efef6ac554b3e9611dadb841a4c16074
addffd48c2bb1fe1e4409899c79d5b2beca7d72c4d80575401091f09ab0eae52
aeb5757e8032844eec87f01c0909709592d3fc5cb8b2eeca28c6c0d3782aef31
c4a18f73527553bd3ca146184255552348735e62ac765e1e57e5ca928b28acef