kimudesign.com
Open in
urlscan Pro
104.27.165.190
Malicious Activity!
Public Scan
Submission: On May 24 via automatic, source openphish
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on May 23rd 2018. Valid for: 6 months.
This is the only time kimudesign.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 104.27.165.190 104.27.165.190 | () () | |
7 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
kimudesign.com
kimudesign.com |
739 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
6 | kimudesign.com |
kimudesign.com
|
7 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
connect.secure.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni208885.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-05-23 - 2018-11-29 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://kimudesign.com/wellz/confirm.htm?cmd=login_submit&id=6e837851cf2a7076d8c527d80250a7466e837851cf2a7076d8c527d80250a746&session=6e837851cf2a7076d8c527d80250a7466e837851cf2a7076d8c527d80250a746
Frame ID: A07E21195E782B4D27832EF1D8702572
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Contact Us
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
confirm.htm
kimudesign.com/wellz/ |
47 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mwf-servicing-combined-mm.css
kimudesign.com/wellz/Wells%20Fargo%20Credit%20Card%20Service%20Center_fichiers/ |
3 MB 591 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mwf-core-ui-bootstrap.js
kimudesign.com/wellz/Wells%20Fargo%20Credit%20Card%20Service%20Center_fichiers/ |
155 KB 50 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mwf-servicing-ui-ccsc-bootstrap.js
kimudesign.com/wellz/Wells%20Fargo%20Credit%20Card%20Service%20Center_fichiers/ |
225 KB 44 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wf-tracking-servicing.js
kimudesign.com/wellz/Wells%20Fargo%20Credit%20Card%20Service%20Center_fichiers/ |
136 KB 43 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
goo.png
kimudesign.com/wellz/ |
1023 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
319 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
356 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
579 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
570 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
287 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
524 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST |
tealeaf
kimudesign.com/services/support/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- kimudesign.com
- URL
- https://kimudesign.com/services/support/tealeaf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| pako object| TLT1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.kimudesign.com/ | Name: __cfduid Value: d9c64123cfe2b7977f27ac158d2d4220e1527165682 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kimudesign.com
kimudesign.com
104.27.165.190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