novobanc.sbs
Open in
urlscan Pro
136.144.41.113
Malicious Activity!
Public Scan
Effective URL: https://novobanc.sbs/login?1
Submission: On February 28 via manual from PT — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 26th 2022. Valid for: 3 months.
This is the only time novobanc.sbs was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Novobanco (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a06:98c1:312... 2a06:98c1:3120::7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 10 | 136.144.41.113 136.144.41.113 | 211252 (AS_DELIS) (AS_DELIS) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
11 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
novobanc.sbs
1 redirects
novobanc.sbs |
637 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 546 |
30 KB |
1 |
smsvp.com
1 redirects
smsvp.com |
1 KB |
11 | 3 |
Domain | Requested by | |
---|---|---|
10 | novobanc.sbs |
1 redirects
code.jquery.com
novobanc.sbs |
1 | code.jquery.com |
novobanc.sbs
|
1 | smsvp.com | 1 redirects |
11 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
novobanc.sbs R3 |
2022-02-26 - 2022-05-27 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://novobanc.sbs/login?1
Frame ID: 90D5AD93947906756A08CF273C8E08CE
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
Login NBnet | novobancoPage URL History Show full URLs
-
https://smsvp.com/l/grUG5
HTTP 302
http://novobanc.sbs/ HTTP 301
https://novobanc.sbs/ Page URL
- https://novobanc.sbs/login?1 Page URL
Detected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- <div class="[^"]*aem-Grid
- /etc\.clientlibs/
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://smsvp.com/l/grUG5
HTTP 302
http://novobanc.sbs/ HTTP 301
https://novobanc.sbs/ Page URL
- https://novobanc.sbs/login?1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://smsvp.com/l/grUG5 HTTP 302
- http://novobanc.sbs/ HTTP 301
- https://novobanc.sbs/
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
novobanc.sbs/ Redirect Chain
|
746 B 815 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Q8HYEGOZRJPCVY9R4HMKTZBJ7U.html
novobanc.sbs/ |
48 B 475 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login
novobanc.sbs/ |
11 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clientlib-base.lc-63b7e15262fa4bc16392c4ff620119c4-lc.min.css
novobanc.sbs/etc.clientlibs/novobancopublicsites/clientlibs/ |
904 KB 83 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
skiptomaincontent.lc-15c8e6e0e8a432d5ad140592e0b96372-lc.min.css
novobanc.sbs/etc.clientlibs/core/wcm/components/page/v2/page/clientlibs/site/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
novobanco-icons.svg
novobanc.sbs/etc.clientlibs/novobancopublicsites/clientlibs/clientlib-base/resources/ |
61 KB 20 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cq5dam.web.1280.1280.jpeg
novobanc.sbs/content/dam/novobancopublicsites/particulares/login_bg.jpeg/jcr:content/renditions/ |
463 KB 463 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NovobancoText-Book.woff
novobanc.sbs/etc.clientlibs/novobancopublicsites/clientlibs/clientlib-resources/resources/fonts/ |
32 KB 32 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NovobancoText-Medium.woff
novobanc.sbs/etc.clientlibs/novobancopublicsites/clientlibs/clientlib-resources/resources/fonts/ |
32 KB 33 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
original.svg
novobanc.sbs/content/dam/novobancopublicsites/logos/novobanco_negativo.svg/_jcr_content/renditions/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- novobanc.sbs
- URL
- https://novobanc.sbs/etc.clientlibs/core/wcm/components/page/v2/page/clientlibs/site/skiptomaincontent.lc-15c8e6e0e8a432d5ad140592e0b96372-lc.min.css
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Novobanco (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
novobanc.sbs/ | Name: csrf-token Value: U7JBZTKMH4R9YVCPJRZOGEYH8Q |
|
novobanc.sbs/ | Name: userId Value: ZHSE92DOIX5NY |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
novobanc.sbs
smsvp.com
novobanc.sbs
136.144.41.113
2001:4de0:ac18::1:a:3a
2a06:98c1:3120::7
239315e34e3505de1711613e8e342ad396a97a92c74116b2aa64c37a3e92a594
43d1ae08b0a15134078bf9b4fe1d7184098ec92cf9152741bb81cd672a5ffa43
50b1758f17eca066d3c2e147a55c41368d67697adaee7c97f3c3d7706ac00393
63ec9237cef48b2cfd492b33ea283f8c80059761fa5cc1564e4c664f995e9223
7a7c300249d7ebe0d8419609fdae3953325a9b51548c88be622665a1bdd6ce6d
88d34466c6999cb9aa100942dbd9f696ac0d70ba91bcc5700d49c575fc011c0f
ceaa2f8cc66bf5aa5e36a7cf28e9618c073db4896d60dfaf82f3b58e0a04b672
e6c646ee2dd1deee0befd3a421422abd8cb605fd7c69c4b0efc646472a1ed737
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e