ktdeo.dbe.gov.mm
Open in
urlscan Pro
103.47.184.53
Malicious Activity!
Public Scan
Effective URL: http://ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/signin.php
Submission: On April 29 via manual from PH — Scanned from DE
Summary
This is the only time ktdeo.dbe.gov.mm was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 103.47.184.53 103.47.184.53 | 9988 (MPT-AP My...) (MPT-AP Myanma Posts and Telecommunications) | |
13 | 1 |
ASN9988 (MPT-AP Myanma Posts and Telecommunications, MM)
ktdeo.dbe.gov.mm |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
dbe.gov.mm
1 redirects
ktdeo.dbe.gov.mm |
240 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
14 | ktdeo.dbe.gov.mm |
1 redirects
ktdeo.dbe.gov.mm
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/signin.php
Frame ID: 0FF4835CFDF9A9DCC28628A32DA329C0
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Netbanco Particulares - SantanderPage URL History Show full URLs
-
http://ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/?b8d1701b3579c1ef038bb77a9090def3
HTTP 302
http://ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/signin.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/?b8d1701b3579c1ef038bb77a9090def3
HTTP 302
http://ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/signin.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
signin.php
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ruxitagentjs_ICA2SVfhqrux_10215210506134511.js
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login_and_register.css
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/css/ |
43 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fonts.css
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/css/ |
4 KB 971 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
santander-logo-red.svg
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/ficheros/modern/images/icons/ |
3 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-image-0.svg
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/ficheros/modern/images/icons/ |
14 KB 14 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderTextW05-Regular.woff2
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
eye-icon_show.svg
ktdeo.dbe.gov.mm/ficheros/modern/images/icons/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderHeadlineW05-Bold.woff2
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderTextW05-Bold.woff2
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderTextW05-Regular.woff
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/fonts/ |
68 KB 68 KB |
Font
font/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderHeadlineW05-Bold.woff
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/fonts/ |
69 KB 70 KB |
Font
font/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderTextW05-Bold.woff
ktdeo.dbe.gov.mm/wp-admin/.Adminser/app/asset/fonts/ |
70 KB 70 KB |
Font
font/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ktdeo.dbe.gov.mm/ | Name: PHPSESSID Value: 94diir2ad3pm9fsb060pbmki05 |
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ktdeo.dbe.gov.mm
103.47.184.53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