pichinchaa.xyz
Open in
urlscan Pro
69.163.226.12
Malicious Activity!
Public Scan
Effective URL: https://pichinchaa.xyz/
Submission: On June 17 via manual from ES
Summary
TLS certificate: Issued by R3 on June 16th 2021. Valid for: 3 months.
This is the only time pichinchaa.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Pichincha (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 22 | 69.163.226.12 69.163.226.12 | 26347 (DREAMHOST-AS) (DREAMHOST-AS) | |
22 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
pichinchaa.xyz
1 redirects
pichinchaa.xyz |
201 KB |
22 | 1 |
Domain | Requested by | |
---|---|---|
22 | pichinchaa.xyz |
1 redirects
pichinchaa.xyz
|
22 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.pichinchaa.xyz R3 |
2021-06-16 - 2021-09-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pichinchaa.xyz/
Frame ID: 57971D114553BAE184374ADC13877D70
Requests: 22 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://pichinchaa.xyz/
HTTP 301
https://pichinchaa.xyz/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
AngularJS (JavaScript Frameworks) Expand
Detected patterns
- script /angular.*\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Google Tag Manager (Tag Managers) Expand
Detected patterns
- html /<!-- (?:End )?Google Tag Manager -->/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://pichinchaa.xyz/
HTTP 301
https://pichinchaa.xyz/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
pichinchaa.xyz/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
pichinchaa.xyz/www.administramedic.com/site/css/ |
119 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.minc619.css
pichinchaa.xyz/www.administramedic.com/site/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font.minc619.css
pichinchaa.xyz//css/ |
0 132 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home.minc619.css
pichinchaa.xyz/www.administramedic.com/site/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rocket-loader.min.js
pichinchaa.xyz/ajax.cloudflare.com/cdn-cgi/scripts/7089c43e/cloudflare-static/ |
12 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
pichinchaa.xyz/media/ |
10 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
verisign.png
pichinchaa.xyz/media/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
huellaDigital.min.js
pichinchaa.xyz/lib/bancopichincha/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
pichinchaa.xyz/lib/jquery/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
pichinchaa.xyz/lib/bootstrap/dist/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
borders.js
pichinchaa.xyz/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
angular.min.js
pichinchaa.xyz//js/ |
165 KB 59 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
checkSession.minc619.js
pichinchaa.xyz//scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home.minc619.js
pichinchaa.xyz//js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gtm5445.html
pichinchaa.xyz/www.googletagmanager.com/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2c2af637.js
pichinchaa.xyz/bcdn-god.we-stats.com/scripts/181e494/ |
441 KB 104 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
huellaDigital.min.js
pichinchaa.xyz/lib/bancopichincha/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
pichinchaa.xyz/lib/jquery/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
15bdeb0d-7e7b-4fdd-b446-0ed0c39e74e8
https://pichinchaa.xyz/ |
141 KB 0 |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
pichinchaa.xyz/lib/bootstrap/dist/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
borders.js
pichinchaa.xyz/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Pichincha (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| angular object| dataLayer function| loadScript object| cdApi2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pichinchaa.xyz/ | Name: cdContextId Value: 2 |
|
.pichinchaa.xyz/ | Name: bmuid Value: 1623942686913-CAE1E753-763D-4D41-8805-EDE891AF115D |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pichinchaa.xyz
69.163.226.12
1b26a5f2141ae354870f503148a32ab9a08247f535fa81bec8f27b0870ee876a
31e5051da69e17e76c0695280fb2915cceba066827595bf241d6380a53f7c413
63c9c9ff7ab1b908fc32b759afc40cf9954c3bf0cb145d4a92ce39d669ae6e91
813be17639d6c165847252e52aae08edf36c78dce3208675cfbf06635d448e1a
9e0a6b8e3cb87d29937802a026ccd1212164b427bc351ac78051081d4784f9a3
af792c6398f9d568f37f7bd93bcd831c5f27bdb0fa19131137c41497fe6576eb
b08cdbc2d30e656a86b20f8342428d5863f70f4b30135b4f4061f754ce932f5e
b7684e82bd70d91521a869ce85b8774e5fa788872c51bea4efd93e246c552a1f
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e79ef9e151a12e5d6aebf7cd5686fb479962074baf65b352a95687436f802ebe