resgateaqui.net
Open in
urlscan Pro
2606:4700:3032::ac43:b6d5
Malicious Activity!
Public Scan
Submission: On June 22 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 21st 2022. Valid for: a year.
This is the only time resgateaqui.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Bradesco (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 2606:4700:303... 2606:4700:3032::ac43:b6d5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
14 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
resgateaqui.net
resgateaqui.net |
194 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 307 |
86 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
13 | resgateaqui.net |
resgateaqui.net
|
1 | ajax.googleapis.com |
resgateaqui.net
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-21 - 2023-06-20 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-06-06 - 2022-08-29 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://resgateaqui.net/webApps_AplicationHome.php?tipoCliente=fisico&segmento=emp&pk_vid=db4b285e4b875c5b157759871728298d&v=2.13.6
Frame ID: A749CDE23A3206AC1A83F7EDB7FB3ECD
Requests: 10 HTTP requests in this frame
Frame:
https://resgateaqui.net/iframes/index.php
Frame ID: 689E4102CE745D0C0F7B58EDF0CBCC11
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Banco Bradesco | Pessoa FĂsica, Exclusive, Prime e PrivateDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
webApps_AplicationHome.php
resgateaqui.net/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
resgateaqui.net/css/ |
142 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mobile.css
resgateaqui.net/css/ |
1 KB 837 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
valida_conta.js
resgateaqui.net/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
avatar.png
resgateaqui.net/img/ |
85 KB 86 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
rodape.jpg
resgateaqui.net/img/ |
5 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 86 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.js
resgateaqui.net/js/ |
73 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
padrao_mk.js
resgateaqui.net/js/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.php
resgateaqui.net/iframes/ Frame 689E |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
btnEnviar.jpg
resgateaqui.net/img/ |
56 KB 57 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
resgateaqui.net/bootstrap/css/ Frame 689E |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap-theme.min.css
resgateaqui.net/bootstrap/css/ Frame 689E |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
resgateaqui.net/bootstrap/js/ Frame 689E |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Bradesco (Banking)32 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| Apenas_Numeros function| VerificaLogin function| ValidaLogin function| ValidaDigito function| Verificar function| checa_agencia function| seguranca_b function| ProcuraObjeto function| controle function| lyrVisual function| mOut function| onMouseOut undefined| tempo number| ns number| ie string| oldId function| ssa function| $ function| jQuery object| bootstrap function| mascaraMike function| pulacampo function| SomenteNumero0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
resgateaqui.net
2606:4700:3032::ac43:b6d5
2a00:1450:4001:801::200a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