ch98745.tw1.ru
Open in
urlscan Pro
2a03:6f00:1::5c35:7627
Malicious Activity!
Public Scan
Submission: On February 18 via api from US — Scanned from US
Summary
This is the only time ch98745.tw1.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 2a03:6f00:1::... 2a03:6f00:1::5c35:7627 | 9123 (TIMEWEB-AS) (TIMEWEB-AS) | |
1 | 92.53.118.39 92.53.118.39 | 9123 (TIMEWEB-AS) (TIMEWEB-AS) | |
16 | 2 |
ASN9123 (TIMEWEB-AS, RU)
PTR: vh312.timeweb.ru
ch98745.tw1.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
tw1.ru
ch98745.tw1.ru |
826 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
16 | ch98745.tw1.ru |
ch98745.tw1.ru
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://ch98745.tw1.ru/sant/538b39cd5bda388/login.php?signin
Frame ID: A8B7C66CC62318B89B54837BDE1A05FD
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
HomeDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
ch98745.tw1.ru/sant/538b39cd5bda388/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
ch98745.tw1.ru/sant/assets/css/ |
152 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
helpers.css
ch98745.tw1.ru/sant/assets/css/ |
41 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fonts.css
ch98745.tw1.ru/sant/assets/css/ |
2 KB 671 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
ch98745.tw1.ru/sant/assets/css/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
ch98745.tw1.ru/sant/assets/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo2.png
ch98745.tw1.ru/sant/assets/images/ |
866 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
eye.png
ch98745.tw1.ru/sant/assets/images/ |
934 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keyboard.png
ch98745.tw1.ru/sant/assets/images/ |
703 B 1013 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
ch98745.tw1.ru/sant/assets/js/ |
86 KB 30 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js
ch98745.tw1.ru/sant/assets/js/ |
20 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
ch98745.tw1.ru/sant/assets/js/ |
58 KB 16 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome.min.js
ch98745.tw1.ru/sant/assets/js/ |
1 MB 378 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
ch98745.tw1.ru/sant/assets/js/ |
2 KB 894 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img2.jpg
ch98745.tw1.ru/sant/assets/images/ |
348 KB 349 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
secure-asterisk.woff
ch98745.tw1.ru/sant/assets/fonts/ |
3 KB 3 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| oncontentvisibilityautostatechange function| $ function| jQuery function| Popper object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome boolean| isShift string| seperator string| dash function| cc_date function| date_of_birth object| x number| j object| selElmnt object| a object| b object| c function| closeAllSelect string| body_image function| RegexCheck1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ch98745.tw1.ru/ | Name: PHPSESSID Value: caddd23e1ac0fe462092f25b84a352ce |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ch98745.tw1.ru
2a03:6f00:1::5c35:7627
92.53.118.39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