portaldacaixa.com
Open in
urlscan Pro
2606:4700:3034::6818:7a10
Malicious Activity!
Public Scan
Submission: On February 09 via manual from BR
Summary
This is the only time portaldacaixa.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Caixa (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:4700:303... 2606:4700:3034::6818:7a10 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
5 | 2606:4700:303... 2606:4700:3033::6818:7b10 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:809::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:808::2003 | 15169 (GOOGLE) (GOOGLE) | |
12 | 5 |
ASN20446 (HIGHWINDS3, US)
maxcdn.bootstrapcdn.com | |
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
portaldacaixa.com
portaldacaixa.com |
51 KB |
2 |
gstatic.com
fonts.gstatic.com |
22 KB |
1 |
googleapis.com
fonts.googleapis.com |
964 B |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
17 KB |
12 | 5 |
Domain | Requested by | |
---|---|---|
7 | portaldacaixa.com |
portaldacaixa.com
|
2 | fonts.gstatic.com |
portaldacaixa.com
|
1 | fonts.googleapis.com |
portaldacaixa.com
|
1 | code.jquery.com |
portaldacaixa.com
|
1 | maxcdn.bootstrapcdn.com |
portaldacaixa.com
|
12 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.storage.googleapis.com GTS CA 1O1 |
2020-01-21 - 2020-04-14 |
3 months | crt.sh |
*.google.com GTS CA 1O1 |
2020-01-21 - 2020-04-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://portaldacaixa.com/login.php
Frame ID: E70D966AD5133468B7B7A0601C95B053
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Bulma (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bulma(?:\.min)?\.css/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.php
portaldacaixa.com/ |
23 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.2/css/ |
93 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pwr.css
portaldacaixa.com/css/ |
818 B 712 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bulma.min.css
portaldacaixa.com/css/ |
213 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cefpwr_03.png
portaldacaixa.com/imagens/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cefpwr_06.png
portaldacaixa.com/imagens/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.0.0.min.js
code.jquery.com/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
phanimate.jquery.js
portaldacaixa.com/js/ |
1 KB 987 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
14 KB 964 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cefpwr_10.png
portaldacaixa.com/imagens/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Caixa (Government)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| mudar_verifica1 function| mudar_verifica2 function| mask function| login02 function| $ function| jQuery function| limitarInput_pwr function| limitarInput21 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.portaldacaixa.com/ | Name: __cfduid Value: d368e3188588af91d7054b33045360fd71581277425 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
portaldacaixa.com
2001:4de0:ac19::1:b:2a
2606:4700:3033::6818:7b10
2606:4700:3034::6818:7a10
2a00:1450:4001:808::2003
2a00:1450:4001:809::200a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