kunden.weiland-wissen.de
Open in
urlscan Pro
2a00:1158:2d:300::ab
Malicious Activity!
Public Scan
Submission: On April 09 via manual from BR
Summary
TLS certificate: Issued by AlphaSSL CA - SHA256 - G2 on January 16th 2019. Valid for: a year.
This is the only time kunden.weiland-wissen.de was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Itau (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2a00:1158:2d:... 2a00:1158:2d:300::ab | 8972 (GD-EMEA-D...) (GD-EMEA-DC-SXB1) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
5 | 151.101.120.193 151.101.120.193 | 54113 (FASTLY) (FASTLY - Fastly) | |
14 | 3 |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
weiland-wissen.de
kunden.weiland-wissen.de |
16 KB |
5 |
imgur.com
i.imgur.com |
159 KB |
1 |
jquery.com
code.jquery.com |
32 KB |
14 | 3 |
Domain | Requested by | |
---|---|---|
8 | kunden.weiland-wissen.de |
kunden.weiland-wissen.de
code.jquery.com |
5 | i.imgur.com | |
1 | code.jquery.com |
kunden.weiland-wissen.de
|
14 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.weiland-wissen.de AlphaSSL CA - SHA256 - G2 |
2019-01-16 - 2020-02-15 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.imgur.com DigiCert SHA2 Secure Server CA |
2018-12-14 - 2020-02-12 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://kunden.weiland-wissen.de/ItokenApp//cliente_id/KCS8ZEWVEC2ZZ5N52U/?cliente=bibibobo@terra.com.br/CIBVDAAFBK4JZJI9DL3PHFMY/concluir.aspx
Frame ID: F7D1BA6160ACF15CC82D37E5B2BE6177
Requests: 1 HTTP requests in this frame
Frame:
https://kunden.weiland-wissen.de/ItokenApp/atendimento/index.php
Frame ID: FA64D5A8DACC348C7E15483BFEC89922
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- url /\.aspx(?:$|\?)/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- url /\.aspx(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
IIS (Web Servers) Expand
Detected patterns
- url /\.aspx(?:$|\?)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
kunden.weiland-wissen.de/ItokenApp//cliente_id/KCS8ZEWVEC2ZZ5N52U/ |
569 B 676 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.php
kunden.weiland-wissen.de/ItokenApp/atendimento/ Frame FA64 |
763 B 920 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.9.1.min.js
code.jquery.com/ Frame FA64 |
90 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
kunden.weiland-wissen.de/ItokenApp/atendimento/js/ Frame FA64 |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
norm.css
kunden.weiland-wissen.de/ItokenApp/atendimento/css/ Frame FA64 |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
princ.php
kunden.weiland-wissen.de/ItokenApp/atendimento/ Frame FA64 |
2 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
function.php
kunden.weiland-wissen.de/ItokenApp/atendimento/ Frame FA64 |
104 B 136 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
zm7WphD.png
i.imgur.com/ Frame FA64 |
85 KB 85 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
FgFdGiC.png
i.imgur.com/ Frame FA64 |
190 B 480 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fytoV8S.png
i.imgur.com/ Frame FA64 |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bKCzwa8.png
i.imgur.com/ Frame FA64 |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bmtpv3h.png
i.imgur.com/ Frame FA64 |
57 KB 57 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
function.php
kunden.weiland-wissen.de/ItokenApp/atendimento/ Frame FA64 |
104 B 159 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
function.php
kunden.weiland-wissen.de/ItokenApp/atendimento/ Frame FA64 |
104 B 159 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Itau (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
kunden.weiland-wissen.de/ | Name: PHPSESSID Value: f20fca46f872bccd0680dcca335331ce |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
i.imgur.com
kunden.weiland-wissen.de
151.101.120.193
205.185.208.52
2a00:1158:2d:300::ab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