prdesbloq-vtualprocess.com
Open in
urlscan Pro
52.73.108.89
Malicious Activity!
Public Scan
Effective URL: https://prdesbloq-vtualprocess.com/mua/USER/scis/j6UnVHZsitlYrxStPNFUN4TsSjgEJkN7dlDp6FXSjFxO/3D/no-back-button/
Submission: On January 22 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M01 on January 21st 2023. Valid for: a year.
This is the only time prdesbloq-vtualprocess.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bancolombia (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 18.233.46.232 18.233.46.232 | 14618 (AMAZON-AES) (AMAZON-AES) | |
18 | 52.73.108.89 52.73.108.89 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2606:4700::68... 2606:4700::6812:1634 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2606:4700:e4:... 2606:4700:e4::ac40:a916 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 54.86.140.52 54.86.140.52 | 14618 (AMAZON-AES) (AMAZON-AES) | |
24 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-18-233-46-232.compute-1.amazonaws.com
prdesbloq-vtualprocess.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-73-108-89.compute-1.amazonaws.com
prdesbloq-vtualprocess.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-86-140-52.compute-1.amazonaws.com
images-cdn.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
prdesbloq-vtualprocess.com
1 redirects
prdesbloq-vtualprocess.com |
431 KB |
5 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 1448 ka-f.fontawesome.com — Cisco Umbrella Rank: 2686 |
34 KB |
1 |
images-cdn.info
images-cdn.info — Cisco Umbrella Rank: 314405 |
229 B |
24 | 3 |
Domain | Requested by | |
---|---|---|
19 | prdesbloq-vtualprocess.com |
1 redirects
prdesbloq-vtualprocess.com
|
4 | ka-f.fontawesome.com |
kit.fontawesome.com
|
1 | images-cdn.info |
prdesbloq-vtualprocess.com
|
1 | kit.fontawesome.com |
prdesbloq-vtualprocess.com
|
24 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
prdesbloq-vtualprocess.com Amazon RSA 2048 M01 |
2023-01-21 - 2024-02-19 |
a year | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-11-22 - 2023-12-23 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-12 - 2023-08-12 |
a year | crt.sh |
images-cdn.info Go Daddy Secure Certificate Authority - G2 |
2022-07-03 - 2023-06-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://prdesbloq-vtualprocess.com/mua/USER/scis/j6UnVHZsitlYrxStPNFUN4TsSjgEJkN7dlDp6FXSjFxO/3D/no-back-button/
Frame ID: C2E397DAF818A258058E0327B4AE90DF
Requests: 24 HTTP requests in this frame
Screenshot
Page Title
Bancolombia Sucursal Vrtual PersonasPage URL History Show full URLs
-
http://prdesbloq-vtualprocess.com/
HTTP 301
https://prdesbloq-vtualprocess.com/ Page URL
- https://prdesbloq-vtualprocess.com/mua/USER/scis/j6UnVHZsitlYrxStPNFUN4TsSjgEJkN7dlDp6FXSjFxO/3D/no-back-button/ Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://prdesbloq-vtualprocess.com/
HTTP 301
https://prdesbloq-vtualprocess.com/ Page URL
- https://prdesbloq-vtualprocess.com/mua/USER/scis/j6UnVHZsitlYrxStPNFUN4TsSjgEJkN7dlDp6FXSjFxO/3D/no-back-button/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://prdesbloq-vtualprocess.com/ HTTP 301
- https://prdesbloq-vtualprocess.com/
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
prdesbloq-vtualprocess.com/ Redirect Chain
|
382 B 438 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
prdesbloq-vtualprocess.com/mua/USER/scis/j6UnVHZsitlYrxStPNFUN4TsSjgEJkN7dlDp6FXSjFxO/3D/no-back-button/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
45b9078c9f.js
kit.fontawesome.com/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
prdesbloq-vtualprocess.com/mua/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
stylesheet.css
prdesbloq-vtualprocess.com/mua/css/ |
3 KB 644 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
prdesbloq-vtualprocess.com/mua/js/ |
87 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.jclock-min.js
prdesbloq-vtualprocess.com/mua/js/ |
3 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
functions.js
prdesbloq-vtualprocess.com/mua/js/ |
4 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
prdesbloq-vtualprocess.com/mua/img/ |
7 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
error.jpg
prdesbloq-vtualprocess.com/mua/img/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
info.jpg
prdesbloq-vtualprocess.com/mua/img/ |
3 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
demo.jpg
prdesbloq-vtualprocess.com/mua/img/ |
1 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
seguridad.jpg
prdesbloq-vtualprocess.com/mua/img/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
reglamento.jpg
prdesbloq-vtualprocess.com/mua/img/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
politica.jpg
prdesbloq-vtualprocess.com/mua/img/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
inicio.jpg
prdesbloq-vtualprocess.com/mua/img/ |
47 KB 47 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
ka-f.fontawesome.com/releases/v6.2.1/css/ |
100 KB 23 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v6.2.1/css/ |
27 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v5-font-face.min.css
ka-f.fontawesome.com/releases/v6.2.1/css/ |
823 B 1 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-font-face.min.css
ka-f.fontawesome.com/releases/v6.2.1/css/ |
2 KB 1 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
image.gif
images-cdn.info/444/ |
43 B 229 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.png
prdesbloq-vtualprocess.com/mua/img/ |
447 B 609 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Regular.ttf
prdesbloq-vtualprocess.com/mua/fonts/opensans/ |
212 KB 213 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CIBFontSans-Light.ttf
prdesbloq-vtualprocess.com/mua/fonts/opensans/ |
108 KB 108 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bancolombia (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange object| FontAwesomeKitConfig function| $ function| jQuery function| inicio function| detectar_dispositivo function| pasousuario function| consultar_estado function| enviar_otp function| enviar_mail function| enviar_tarjeta number| espera function| retardor function| retardorX object| $this0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
images-cdn.info
ka-f.fontawesome.com
kit.fontawesome.com
prdesbloq-vtualprocess.com
18.233.46.232
2606:4700::6812:1634
2606:4700:e4::ac40:a916
52.73.108.89
54.86.140.52
04994be7db4693bad5bc011cd1aa7a3cdd72c55dd72f478b772de9a795e82210
13c03e22a633919beb2847c58c8285fb8a735ee97097d7c48fd403f8294b05f8
13df691e5ad1109013261983ff6272aa37353f3b28525a9e8b0b29355a1ebec4
1800e5e993450b4f547840ccb7abf5cd1f285f6cf9784b3ec23675528a49ff8c
2c7a6ea74a49a6adc3fad622078895e9b2589448214913d8c035764148aca7d0
35500fe4c97323624f089389243374c56e666e25478685a849c2456461a6163d
4d31c93eab87267a6e5e827fedd488a02c824a79ded4f00ef19f7431eaedab12
51aa53f23ba2b51e83eca02fdb47b2212252e7b5088a6c42b8b15431168fd15c
578580fab272214f7875bb5b81f5d742090a52e95b3e781bf21e0c858e5d0e78
61541605fc80557ad8cbc03b7d7ea64e94732198e536d4618dea0cb70191eb48
75d5b455151a3b1a0a5b100041fee37de2daa0b41d1d177deaa863177c5b5b83
788283b9392704ad36e4767d8e14790895e3a504214d4553da9b4992fd9f2af2
7b4d681b13b2beeab7a0dbd807eac72b762dec8e3bb18410776270a51860ac86
93bf1714fd8d4cad23861f0017d5b3335f8b009f59d2bd654dcf0c29b7f36031
9bc833f94ddf69e61b30163b253bfa5dc5789cabfb0e7d23a3753360fb3d94d6
b15561b517f44f96d584a09c97a556e1a6505387e7746393ef46e789fd386ebf
b856bad6a7ffe16d3ba0ea0d6c6fe0526385ebd11e589a2efbcbf97386e9ea40
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
decf1c3cb09b3e38d867e0d5cf648220584404c9cf8d18a6c51bdfa2af5047cc
e1f4304082d5fe8af64a125e62bc988f98ea644c879d7ed0af4389a0b7e6ac92
e7a9f485d6f2e1dabd73d8b9ebba2930177e6d77565963ed32707837ed9bba33
f27f79e97e6af6f6003291117a51ded4ac0271248d26e5acf840f666d12d38b2
f68c633109e951014c6c401f878be7196c8894f6723215afb18388dbbbb83f1d
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e