cg12666.tmweb.ru
Open in
urlscan Pro
2a03:6f00:6:1::517:33ec
Malicious Activity!
Public Scan
Submission: On August 02 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by GlobalSign GCC R3 DV TLS CA 2020 on May 5th 2022. Valid for: a year.
This is the only time cg12666.tmweb.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNP Paribas (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2a03:6f00:6:1... 2a03:6f00:6:1::517:33ec | 9123 (TIMEWEB-AS) (TIMEWEB-AS) | |
12 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
tmweb.ru
cg12666.tmweb.ru |
868 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | cg12666.tmweb.ru |
cg12666.tmweb.ru
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.tmweb.ru GlobalSign GCC R3 DV TLS CA 2020 |
2022-05-05 - 2023-06-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cg12666.tmweb.ru/
Frame ID: 00208E4E186B4BDCB75AF928B7BEDA52
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
cg12666.tmweb.ru/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dciweb.css
cg12666.tmweb.ru/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bnp.css
cg12666.tmweb.ru/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tools.js
cg12666.tmweb.ru/ |
40 KB 11 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
headerBack.jpg
cg12666.tmweb.ru/ |
10 KB 10 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
etape1.png
cg12666.tmweb.ru/ |
476 B 654 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
etape2.png
cg12666.tmweb.ru/ |
567 B 745 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dciweb96e2.png
cg12666.tmweb.ru/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flecheCorriger.png
cg12666.tmweb.ru/ |
538 B 716 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
btn_valider.png
cg12666.tmweb.ru/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
btn_annuler.png
cg12666.tmweb.ru/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
covid19-information.png
cg12666.tmweb.ru/images/ |
831 KB 832 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNP Paribas (Banking)95 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| msgErreur function| setselect function| getselect function| setradio function| getradio function| CheckForbiddenCharMessage function| CheckForbiddenChar function| CheckForbiddenCharOld function| ZeroDevant function| CheckRIBAlert function| CheckRIB function| CheckAFB function| CheckAFBAlert function| ReadAmount function| CheckAmount function| CheckAmountAlert function| CheckAmountAlertForHtml5 function| CheckNumber function| CheckAmountCouple function| Today function| ReadDate function| CheckDate function| checkDateMobile function| CheckDateAlert function| CheckDateCouple function| CheckIBAN function| KeyIBAN function| TranslateAlpha2Num function| CheckInt function| CheckIntAlert function| lvtrim function| rvtrim function| vtrim function| ltrim function| rtrim function| trim function| CheckStr function| CheckStrAlert function| TextFormat function| TextTranslate function| pad_right function| CheckTime function| CheckTimeAlert function| CheckEmail number| posX function| getMousePos function| getScrollX function| getScrollY function| AffBulle function| HideBulle function| random function| gen_clavier function| makepwd function| clearpwd function| valdec_form function| check_nbdec function| FormatMonnaie function| ChargerCookie function| FormatChecked function| createXmlHttpRequest function| supZero function| logout function| openPopup function| CheckEndDateAFB160 function| setBorder function| showHideError function| documentWrite function| closeReveal function| isInputTypeSupported function| isAttributeSupported function| isHtml5 function| transcoCodeForCreateBeneficiary function| CheckAFBMobile number| posY object| theBody function| clearParams function| control function| submitform function| key function| pwd_writeM number| CellX number| CellY number| col number| lig object| tabcar number| posX1 number| posY10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cg12666.tmweb.ru
2a03:6f00:6:1::517:33ec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