caisse--regionalecas.web.app Open in urlscan Pro
2620:0:890::100  Malicious Activity! Public Scan

URL: https://caisse--regionalecas.web.app/
Submission: On March 22 via api from JP — Scanned from JP

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 2620:0:890::100, located in United States and belongs to FASTLY, US. The main domain is caisse--regionalecas.web.app.
TLS certificate: Issued by GTS CA 1D4 on March 6th 2023. Valid for: 3 months.
This is the only time caisse--regionalecas.web.app was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Banque Postale (Banking)

Domain & IP information

IP Address AS Autonomous System
1 2620:0:890::100 54113 (FASTLY)
1 51.178.9.87 16276 (OVH)
2 2
Domain Requested by
1 www.lebrandcenter.lapostegroupe.com caisse--regionalecas.web.app
1 caisse--regionalecas.web.app
2 2

This site contains links to these domains. Also see Links.

Domain
bkcaisseregiont.duckdns.org
Subject Issuer Validity Valid
web.app
GTS CA 1D4
2023-03-06 -
2023-06-04
3 months crt.sh
www.lebrandcenter.lapostegroupe.com
GlobalSign RSA OV SSL CA 2018
2022-10-03 -
2023-11-04
a year crt.sh

This page contains 1 frames:

Primary Page: https://caisse--regionalecas.web.app/
Frame ID: 68F16A89D6D3C95023711461DA7A864F
Requests: 2 HTTP requests in this frame

Screenshot


Page Statistics

2
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

48 kB
Transfer

51 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
caisse--regionalecas.web.app/
5 KB
2 KB
Document
General
Full URL
https://caisse--regionalecas.web.app/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2620:0:890::100 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
c5e0e4a8ab8801df3812d6e80011cc83d022d411785e6e44a92fcfb7f65b069a
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

accept-ranges
bytes
alt-svc
h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
cache-control
max-age=3600
content-encoding
br
content-length
1203
content-type
text/html; charset=utf-8
date
Wed, 22 Mar 2023 04:03:25 GMT
etag
"47d6e4215f74bb1bf24fcb60d6db6ea59fbf2964f31db7000f6e4ea290c11344-br"
last-modified
Mon, 20 Mar 2023 15:36:38 GMT
strict-transport-security
max-age=31556926; includeSubDomains; preload
vary
x-fh-requested-host, accept-encoding
x-cache
MISS
x-cache-hits
0
x-served-by
cache-nrt-rjtf7700056-NRT
x-timer
S1679457805.468348,VS0,VE232
1646129166_20220223_lbp_logo_fdclair_rvb_360x260-621dd49606c26.jpg
www.lebrandcenter.lapostegroupe.com/secure/uploads/document/vignette/
46 KB
47 KB
Image
General
Full URL
https://www.lebrandcenter.lapostegroupe.com/secure/uploads/document/vignette/1646129166_20220223_lbp_logo_fdclair_rvb_360x260-621dd49606c26.jpg
Requested by
Host: caisse--regionalecas.web.app
URL: https://caisse--regionalecas.web.app/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.178.9.87 , France, ASN16276 (OVH, FR),
Reverse DNS
ip87.ip-51-178-9.eu
Software
Apache /
Resource Hash
d78d58b056c3f22519b2e05cac528893b2d3be26026f80b5e8d7f3a2480ed842
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://caisse--regionalecas.web.app/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36

Response headers

Date
Wed, 22 Mar 2023 04:03:28 GMT
Strict-Transport-Security
max-age=0; includeSubDomains;
Last-Modified
Tue, 01 Mar 2022 10:06:06 GMT
Server
Apache
Content-Type
image/jpeg
Cache-Control
max-age=0, must-revalidate, private
Content-Disposition
attachment; filename=1646129166_20220223_lbp_logo_fdclair_rvb_360x260-621dd49606c26.jpg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=100
Content-Length
47428
Expires
Wed, 22 Mar 2023 04:03:28 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Banque Postale (Banking)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

caisse--regionalecas.web.app
www.lebrandcenter.lapostegroupe.com
2620:0:890::100
51.178.9.87
c5e0e4a8ab8801df3812d6e80011cc83d022d411785e6e44a92fcfb7f65b069a
d78d58b056c3f22519b2e05cac528893b2d3be26026f80b5e8d7f3a2480ed842