puellabeauty.com
Open in
urlscan Pro
162.241.124.211
Malicious Activity!
Public Scan
Effective URL: https://puellabeauty.com/Up/nedbank/app/login.php?MTY1MDUzNDU2MDVkYjU0NmU0OWMyMGI3MGM4YWJmN2E3ZGRkYTZhOTYxNzI3NjYxOTIwZjI...
Submission: On April 21 via manual from ZA — Scanned from DE
Summary
TLS certificate: Issued by R3 on April 18th 2022. Valid for: 3 months.
This is the only time puellabeauty.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Nedbank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 3.214.61.137 3.214.61.137 | 14618 (AMAZON-AES) (AMAZON-AES) | |
2 3 | 162.241.124.211 162.241.124.211 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-214-61-137.compute-1.amazonaws.com
rebrand.ly |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-124-211.unifiedlayer.com
puellabeauty.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
puellabeauty.com
2 redirects
puellabeauty.com |
4 MB |
1 |
rebrand.ly
1 redirects
rebrand.ly — Cisco Umbrella Rank: 76949 |
295 B |
1 | 2 |
Domain | Requested by | |
---|---|---|
3 | puellabeauty.com | 2 redirects |
1 | rebrand.ly | 1 redirects |
1 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
webdisk.puellabeauty.com R3 |
2022-04-18 - 2022-07-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://puellabeauty.com/Up/nedbank/app/login.php?MTY1MDUzNDU2MDVkYjU0NmU0OWMyMGI3MGM4YWJmN2E3ZGRkYTZhOTYxNzI3NjYxOTIwZjIwOWRkNzk3NDA4OWRkZjU4MzMxZDgwMjZhNzYwZQ==
Frame ID: AAD7B37E2405C005707CBE0976E065F7
Requests: 27 HTTP requests in this frame
Screenshot
Page Title
Online BankingPage URL History Show full URLs
-
https://rebrand.ly/sow0qg9
HTTP 301
https://puellabeauty.com/Up/nedbank HTTP 301
https://puellabeauty.com/Up/nedbank/ HTTP 302
https://puellabeauty.com/Up/nedbank/app/login.php?MTY1MDUzNDU2MDVkYjU0NmU0OWMyMGI3MGM4YWJmN2E3ZGRkYTZ... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rebrand.ly/sow0qg9
HTTP 301
https://puellabeauty.com/Up/nedbank HTTP 301
https://puellabeauty.com/Up/nedbank/ HTTP 302
https://puellabeauty.com/Up/nedbank/app/login.php?MTY1MDUzNDU2MDVkYjU0NmU0OWMyMGI3MGM4YWJmN2E3ZGRkYTZhOTYxNzI3NjYxOTIwZjIwOWRkNzk3NDA4OWRkZjU4MzMxZDgwMjZhNzYwZQ== Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
puellabeauty.com/Up/nedbank/app/ Redirect Chain
|
4 MB 4 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
933 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
12 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
736 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
162 KB 162 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
310 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
127 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
474 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
158 KB 158 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
392 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
22 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
12 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
22 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
766 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
256 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
973 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
162 KB 162 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
231 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Nedbank (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails function| savepage_ShadowLoader1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
puellabeauty.com/ | Name: PHPSESSID Value: 567aefafbd268da88210e8032b59c679 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
puellabeauty.com
rebrand.ly
162.241.124.211
3.214.61.137
00ff1bb43d0a271618cd1f626e0530c4e9efb344058b85744e569306c93ecc42
080b7f43fe9647ac23441faa9000b1a3bb976b03f1f0e8754b621b56f2213d91
08928fb384bd714c81d0f08fea38a92f27e497a92e6ea1c521dbe95410ebfe33
131eaae8eadb54e1fde40dea47b45bfd1986299b3f98141704a60522cfa53631
1ff2a8671111fb294acbd910e0ff757971eaeb4b381206de8ebabb38e259ca15
203680b7945ca5c9f3697881f9af9c8ed160354675055d22fc34545910cd4d54
24af98f5927069908c81e519b1082493492411999b322d3297a0be59baed39ed
39b5f1c0f6f72d7ca3c3181749b646470718a5a8eca80ce13d0b63c15edb2e7c
3bf07d30c5c5867acf6a3ec763086a9c3d1ea5c7e6783c1550e1309c67e59bf3
4cfabcfdbec9a5cd903190f150028743f38c3533b53ea21c6e4dd35a52a80383
5c6c8d8c0e52c66587d5f15d69de975d84894fc26afc864cd7b3eebde68b426c
60c9a258eafdbdf659213b3de1e2dae64fd5665676ea9ec5e8d0b7c9918c1a8b
69ebe717522a7556601267b35fb94240f7e9de4e9909ff4e64bfbf2d62d82653
8fd778cf8be190de02f1a95bb0a3d1ba158c4041b109fa8ac002c245056e06dc
9731178a65895ad7a2835bb97c7d3e1fbb030448ce0af77fad66d45559beee0d
979af22174e46123e6fb3c96d96360ba0ea7a5dbd00ae97ab1ebefae9c284d37
a33198f43372edb1be7a4f6694fcce80b8ddccbe3a7da64745d14c74ad061179
ad51841bf5cf5eb27ead0ae50f936f678eeb2d4e1be6035e83fce13b0e3b83bb
b1c56687721b196a831000ed2d64a32b9ada23c0c52ee57b3b6cea872d828067
b56bd2aeb39c48bb1732623689421c02c93461a6024a657124450d5664bbbb56
bc7e5de2cab951083e917d5a60234c649efe2f9f814774c39c62b5c6120ce5da
c494556e984a6687568482537283c78d140d1f3e672707da437707d6bbefa6c9
c9530d7b754d6ccb371e5c96c5efb0e0c643b384d758e663d3fb4cf16b7dd546
d88fedad79f51cae5be17cd5ee16ea706978380791b34100beade1881a5974f4
e79680516f7aebb8535d875afb21b608dc955fa48f3084502858ea7513ba547c
eaa561f9f8ef5b69bd39e15e332dc3700decacebf48e08b0640ad3a5d8711f65
f7baf6fab8ed8563ffcf45e566735dc4adf36fd5243d0c2ffdf472905bc7e018