www.royalegyptian.pk
Open in
urlscan Pro
167.114.45.139
Malicious Activity!
Public Scan
Submission: On July 04 via automatic, source openphish
Summary
This is the only time www.royalegyptian.pk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 167.114.45.139 167.114.45.139 | 16276 (OVH) (OVH) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
6 | 2 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
royalegyptian.pk
www.royalegyptian.pk |
74 KB |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | www.royalegyptian.pk |
www.royalegyptian.pk
|
1 | www.sitepoint.com |
www.royalegyptian.pk
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/Up-dating4.php
Frame ID: 6FD00E2C2BEDC058F6F895DC039374B9
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
Up-dating4.php
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bo2.png
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/images/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bo1.png
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/images/ |
57 KB 57 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cancel.png
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
continue.png
www.royalegyptian.pk/wp-admin/Mini%20Card/d41d8cd98f00b204e9800998ecf8427e/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Bank of America (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| unhideBody1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.royalegyptian.pk/ | Name: PHPSESSID Value: en8lj2i4k1dvmrh7eo5gq2uvd6 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.royalegyptian.pk
www.sitepoint.com
167.114.45.139
54.148.84.95
28b4667350a8bbee3866efb87814c9808d928e667cceff2f86bfa99fca89e5c9
2cfdb08c07395b0be65df154f068ade61c1bfad7e3e3e2d0e40b85319fa95825
389beee741855c0e9dc57e8fc0134d0cc39302175245c6647bd8301922eab856
6d8276584e778ded8c1d94897c0cccd08d36f1e7940f418090fe4089e50123e3
8680521eaccf4c2e7b811a9b48eeb1253483addd139d6fc8203d31068336d7e3
eebf59e2236489b4c54fff44e8cef8363cc83a7b3a6413e6b7bb876ec63e0270