www.neueinrichtung-sparkasse.de Open in urlscan Pro
185.11.145.254  Malicious Activity! Public Scan

URL: https://www.neueinrichtung-sparkasse.de/
Submission: On April 11 via automatic, source certstream-suspicious — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 8 HTTP transactions. The main IP is 185.11.145.254, located in Netherlands and belongs to NETSOLUTIONS, MO. The main domain is www.neueinrichtung-sparkasse.de.
TLS certificate: Issued by ZeroSSL ECC Domain Secure Site CA on April 11th 2023. Valid for: 3 months.
This is the only time www.neueinrichtung-sparkasse.de was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Sparkasse (Banking)

Domain & IP information

IP Address AS Autonomous System
3 185.11.145.254 47674 (NETSOLUTIONS)
1 62.181.151.235 15790 (FINANZINF...)
8 3
Apex Domain
Subdomains
Transfer
3 neueinrichtung-sparkasse.de
www.neueinrichtung-sparkasse.de
49 KB
1 berliner-sparkasse.de
www.berliner-sparkasse.de — Cisco Umbrella Rank: 346940
225 KB
8 2
Domain Requested by
3 www.neueinrichtung-sparkasse.de www.neueinrichtung-sparkasse.de
1 www.berliner-sparkasse.de www.neueinrichtung-sparkasse.de
www.berliner-sparkasse.de
8 2

This site contains links to these domains. Also see Links.

Domain
www.berliner-sparkasse.de
Subject Issuer Validity Valid
www.neueinrichtung-sparkasse.de
ZeroSSL ECC Domain Secure Site CA
2023-04-11 -
2023-07-10
3 months crt.sh
www.berliner-sparkasse.de
QuoVadis Europe EV SSL CA G1
2022-05-02 -
2023-05-01
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.neueinrichtung-sparkasse.de/
Frame ID: 3DA4B8C813004D8B2973AB83A294A569
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

Sparkasse: Produkte und Services | Sparkasse.de

Detected technologies

Overall confidence: 100%
Detected patterns
  • /etc/clientlibs/

Page Statistics

8
Requests

50 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

274 kB
Transfer

2239 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.neueinrichtung-sparkasse.de/
6 KB
2 KB
Document
General
Full URL
https://www.neueinrichtung-sparkasse.de/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
185.11.145.254 , Netherlands, ASN47674 (NETSOLUTIONS, MO),
Reverse DNS
Software
BlazingFastWeb /
Resource Hash
94c81f5bf8335b950e60663e807fd29d447be4e65aab1a001328ffe5445ea6c8

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Access-Control-Allow-Origin
*
Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Tue, 11 Apr 2023 21:58:01 GMT
Server
BlazingFastWeb
Transfer-Encoding
chunked
Vary
Accept-Encoding
internetfiliale.min.6322b4c93d086feb4835a810becb2cf5.css
www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/
2 MB
225 KB
Stylesheet
General
Full URL
https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale.min.6322b4c93d086feb4835a810becb2cf5.css
Requested by
Host: www.neueinrichtung-sparkasse.de
URL: https://www.neueinrichtung-sparkasse.de/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
62.181.151.235 Wuppertal, Germany, ASN15790 (FINANZINFORMATIK-AS-OST, DE),
Reverse DNS
Software
/
Resource Hash
9c00e9d0afa21d6ca0e1f1dfc33e45714030aa5a97562d069059b790d7d3352c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options DENY

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.neueinrichtung-sparkasse.de/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Date
Tue, 11 Apr 2023 21:57:22 GMT
Strict-Transport-Security
max-age=31536000
Content-Encoding
gzip
Last-Modified
Tue, 11 Apr 2023 15:20:08 GMT
ETag
"222ca2-5f91106e53446"
Vary
Accept-Encoding,User-Agent
X-Frame-Options
DENY
Content-Type
text/css
Transfer-Encoding
chunked
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=100
X-UA-Compatible
IE=edge
tenant_header_logo.svg
www.neueinrichtung-sparkasse.de/
15 KB
15 KB
Image
General
Full URL
https://www.neueinrichtung-sparkasse.de/tenant_header_logo.svg
Requested by
Host: www.neueinrichtung-sparkasse.de
URL: https://www.neueinrichtung-sparkasse.de/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
185.11.145.254 , Netherlands, ASN47674 (NETSOLUTIONS, MO),
Reverse DNS
Software
BlazingFastWeb /
Resource Hash
b0806659e4a12b2665227e54911485706ed7f288c7cef9e55add4b4d917d3092

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.neueinrichtung-sparkasse.de/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Date
Tue, 11 Apr 2023 21:58:01 GMT
Last-Modified
Tue, 11 Apr 2023 16:33:16 GMT
Server
BlazingFastWeb
ETag
"3a0a-5f9120c6d9d65"
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800, public, must-revalidate
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
14858
Expires
Tue, 18 Apr 2023 21:58:01 GMT
Sparkasse_web_Rg.woff2
www.neueinrichtung-sparkasse.de/
31 KB
31 KB
Font
General
Full URL
https://www.neueinrichtung-sparkasse.de/Sparkasse_web_Rg.woff2
Requested by
Host: www.neueinrichtung-sparkasse.de
URL: https://www.neueinrichtung-sparkasse.de/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
185.11.145.254 , Netherlands, ASN47674 (NETSOLUTIONS, MO),
Reverse DNS
Software
BlazingFastWeb /
Resource Hash
a1526819ed10b3c4d9a1f6e956e673b47f295e58ac66e27391777e58e870331d

Request headers

Referer
https://www.neueinrichtung-sparkasse.de/
Origin
https://www.neueinrichtung-sparkasse.de
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Date
Tue, 11 Apr 2023 21:58:02 GMT
Last-Modified
Tue, 11 Apr 2023 16:37:22 GMT
Server
BlazingFastWeb
ETag
"7c14-5f9121b19aa31"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800, public, must-revalidate
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
31764
Expires
Tue, 18 Apr 2023 21:58:02 GMT
Sparkasse_web_Rg.woff
www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/
0
0

pictos-if.woff
www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/
0
0

Sparkasse_web_Rg.ttf
www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/
0
0

pictos-if.ttf
www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.berliner-sparkasse.de
URL
https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/Sparkasse_web_Rg.woff
Domain
www.berliner-sparkasse.de
URL
https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/pictos-if.woff
Domain
www.berliner-sparkasse.de
URL
https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/Sparkasse_web_Rg.ttf
Domain
www.berliner-sparkasse.de
URL
https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/pictos-if.ttf

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Sparkasse (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless function| addDots

0 Cookies

8 Console Messages

Source Level URL
Text
javascript error URL: https://www.neueinrichtung-sparkasse.de/
Message:
Access to font at 'https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/Sparkasse_web_Rg.woff' from origin 'https://www.neueinrichtung-sparkasse.de' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/Sparkasse_web_Rg.woff
Message:
Failed to load resource: net::ERR_FAILED
javascript error URL: https://www.neueinrichtung-sparkasse.de/
Message:
Access to font at 'https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/pictos-if.woff' from origin 'https://www.neueinrichtung-sparkasse.de' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/pictos-if.woff
Message:
Failed to load resource: net::ERR_FAILED
javascript error URL: https://www.neueinrichtung-sparkasse.de/
Message:
Access to font at 'https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/Sparkasse_web_Rg.ttf' from origin 'https://www.neueinrichtung-sparkasse.de' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/Sparkasse_web_Rg.ttf
Message:
Failed to load resource: net::ERR_FAILED
javascript error URL: https://www.neueinrichtung-sparkasse.de/
Message:
Access to font at 'https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/pictos-if.ttf' from origin 'https://www.neueinrichtung-sparkasse.de' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://www.berliner-sparkasse.de/etc/clientlibs/myif/master/base/internetfiliale/fonts/pictos-if.ttf
Message:
Failed to load resource: net::ERR_FAILED