nimi-group.com Open in urlscan Pro
45.63.99.67  Malicious Activity! Public Scan

Submitted URL: https://tarjetassantander.chocek.com/
Effective URL: https://nimi-group.com/wp-content/*/santawa3ramoha/particulares/home.php?web=succes&local=_&id=24410873
Submission: On October 25 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST ./request.php?step=one&id=62022398

<form id="lFrm" method="post" action="./request.php?step=one&amp;id=62022398">
  <select class="select1" id="pnl" name="pnl">
    <option value="Usuario">Usuario</option>
    <option value="Documento" selected="selected">Documento</option>
  </select>
  <select class="select2" id="type" name="type">
    <option value="N-I-F">NlF</option>
    <option value="C-I-F">ClF</option>
    <option value="N-I-E">NlE</option>
    <option value="P-A-S-P-O-R-T">PASAPORTE</option>
  </select>
  <input type="text" id="Uid" name="Uid" maxlength="9" placeholder="NlF / ClF / NlT" autocomplete="off" required="">
  <input type="text" id="Pid" name="Pid" maxlength="8" placeholder="Clmot dt mcctzv" autocomplete="off" required="">
  <div class="box"><img src="layout/img/box.svg"><span>Itcvidmi ar pzpmirv</span></div>
  <button value="" type="submit">tneimi</button>
  <div class="span2">
    <span>Itcputimi clmot</span>
    <span>Vbetnti clmotz</span>
  </div>
  <div class="separator"></div>
  <div class="spanonly">hmset clrtnet</div>
</form>

Text Content

Metncrón ml clrtnet
Bptnvz dímz

25 October 2021

Ri m qtb clmzrcm

Usuario Documento NlF ClF NlE PASAPORTE
Itcvidmi ar pzpmirv
tneimi
Itcputimi clmot Vbetnti clmotz

hmset clrtnet

Ztgpirdmd | Rnzeipccrvntz dt mcctzv | Uvlíercm dt Cvvxrtz

Ztgpirdmd

Rnzeipccrvntz dt mcctzv

Uvlíercm dt Cvvxrtz