www.royalegyptian.pk
Open in
urlscan Pro
167.114.45.139
Malicious Activity!
Public Scan
Submission: On July 04 via automatic, source openphish
Summary
This is the only time www.royalegyptian.pk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 167.114.45.139 167.114.45.139 | 16276 (OVH) (OVH) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
5 | 2 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
royalegyptian.pk
www.royalegyptian.pk |
51 KB |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
5 | 2 |
Domain | Requested by | |
---|---|---|
4 | www.royalegyptian.pk |
www.royalegyptian.pk
|
1 | www.sitepoint.com |
www.royalegyptian.pk
|
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/Up-dating5.php?country.x=-&ACCT.x=ID-PPL=PA324188.166.98.249=ScrPg=fbf9f9d17ad6403a5b4257ccd6ba4fc37c412a2f7eab6d7f640da8705a09a68aS=$1$YSXeNp9p$Z.med1RcUKtbWBpMVXxyr0dze4uvN2ygXqLkGRlUsK7oH6TWaBitrMAFE3pYZICSmQ1V09w8DP5hJjfnxOcbDcfoNrpxvA2S0n8uW6TyOVh9BkX5JaP4gliYGMUestHIKF3LEq1jCRzdm7wbQZ88189366835
Frame ID: D37D5B7172C8A77453B2FA6319542A43
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
Up-dating5.php
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bo2.png
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/images/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boqq.png
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/images/ |
35 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
continue.png
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Bank of America (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| unhideBody1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.royalegyptian.pk/ | Name: PHPSESSID Value: utnitp26dog2848sqplsr7ip32 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.royalegyptian.pk
www.sitepoint.com
167.114.45.139
54.148.84.95
14f3cfa66252779e9e354cd12bf67aac3d04a663a30262697fa1cea9a14f01a7
2c5d7b88b4e65378cae0f52d96d824a5630edeeedd9d1f955293210a34c93f7c
2cfdb08c07395b0be65df154f068ade61c1bfad7e3e3e2d0e40b85319fa95825
389beee741855c0e9dc57e8fc0134d0cc39302175245c6647bd8301922eab856
6d8276584e778ded8c1d94897c0cccd08d36f1e7940f418090fe4089e50123e3