www.firstfloppy.com
Open in
urlscan Pro
103.231.78.227
Malicious Activity!
Public Scan
Effective URL: https://www.firstfloppy.com/METROBANK/signin.php
Submission: On December 03 via manual from PH
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on September 4th 2019. Valid for: 2 years.
This is the only time www.firstfloppy.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Metrobank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:303... 2606:4700:3032::681b:bb0b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 2 | 103.231.78.227 103.231.78.227 | 18229 (CTRLS-AS-...) (CTRLS-AS-IN CtrlS Datacenters Ltd.) | |
2 | 107.162.152.249 107.162.152.249 | 55002 (DEFENSE-NET) (DEFENSE-NET) | |
3 | 3 |
ASN18229 (CTRLS-AS-IN CtrlS Datacenters Ltd., IN)
PTR: ccaschoolgurgaon.org
www.firstfloppy.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
metrobank.com.ph
onlinebanking.metrobank.com.ph |
648 KB |
2 |
firstfloppy.com
1 redirects
www.firstfloppy.com |
26 KB |
1 |
kutt.it
1 redirects
kutt.it |
874 B |
3 | 3 |
Domain | Requested by | |
---|---|---|
2 | onlinebanking.metrobank.com.ph |
www.firstfloppy.com
|
2 | www.firstfloppy.com | 1 redirects |
1 | kutt.it | 1 redirects |
3 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
firstfloppy.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-04 - 2021-09-03 |
2 years | crt.sh |
onlinebanking.metrobank.com.ph GlobalSign Extended Validation CA - SHA256 - G3 |
2019-07-10 - 2021-07-10 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.firstfloppy.com/METROBANK/signin.php
Frame ID: D77B1ECF58B11603D3094A76B26F5070
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://kutt.it/metro2020/
HTTP 302
https://www.firstfloppy.com/METROBANK/ HTTP 302
https://www.firstfloppy.com/METROBANK/signin.php Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://kutt.it/metro2020/
HTTP 302
https://www.firstfloppy.com/METROBANK/ HTTP 302
https://www.firstfloppy.com/METROBANK/signin.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
signin.php
www.firstfloppy.com/METROBANK/ Redirect Chain
|
63 KB 26 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b2a2e35cd37c19553fd06a07eb4ab217.png
onlinebanking.metrobank.com.ph/ |
24 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b93202958cb9ef4782f231e431f02c08.jpg
onlinebanking.metrobank.com.ph/ |
622 KB 623 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Metrobank (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kutt.it
onlinebanking.metrobank.com.ph
www.firstfloppy.com
103.231.78.227
107.162.152.249
2606:4700:3032::681b:bb0b
10d6bd3a8ad98807b5e1dfc9d35f7fe06c8c1c7833f5b7989e8d30e21acb98f1
411ec5f8f5db240e6bc6c52eeb23079bc850ea4b066d04e64cc83c874a4b3c98
eb24635be1749a8010105c502ba577be7b18a6367e404f48c7a7c8ae4f8ee2fa
f166b723f0dc67ce89c2ef11f623bb85fbd69d3657a2a5d3a336714071bf2eab