a0314669.xsph.ru
Open in
urlscan Pro
2a0a:2b43:7b:62da::
Malicious Activity!
Public Scan
Effective URL: http://a0314669.xsph.ru//assef/pindex.html?cmd=_account-details&session=faed8a7d7e03ae066a15dbcf9d7159e7&dispatch=0d9f76...
Submission: On July 01 via manual from FR
Summary
This is the only time a0314669.xsph.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNP Paribas (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 46.248.190.217 46.248.190.217 | 47544 (IQPL-AS) (IQPL-AS) | |
1 | 77.222.40.199 77.222.40.199 | 44112 (SWEB-AS) (SWEB-AS) | |
1 19 | 2a0a:2b43:7b:... 2a0a:2b43:7b:62da:: | 35278 (SPRINTHOST) (SPRINTHOST) | |
1 | 2a00:1450:400... 2a00:1450:4001:814::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
20 | 3 |
ASN44112 (SWEB-AS, RU)
PTR: vh270.sweb.ru
voyageprop.temp.swtest.ru |
ASN15169 (GOOGLE - Google LLC, US)
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
xsph.ru
1 redirects
a0314669.xsph.ru |
196 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
swtest.ru
voyageprop.temp.swtest.ru |
348 B |
1 |
cutt.ly
1 redirects
cutt.ly |
222 B |
20 | 4 |
Domain | Requested by | |
---|---|---|
19 | a0314669.xsph.ru |
1 redirects
a0314669.xsph.ru
|
1 | ajax.googleapis.com |
a0314669.xsph.ru
|
1 | voyageprop.temp.swtest.ru | |
1 | cutt.ly | 1 redirects |
20 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh | |
*.googleapis.com Google Internet Authority G3 |
2019-06-11 - 2019-09-03 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://a0314669.xsph.ru//assef/pindex.html?cmd=_account-details&session=faed8a7d7e03ae066a15dbcf9d7159e7&dispatch=0d9f7696e7f75e583420f4c49ac6a4a6d9d24f95
Frame ID: 00BCACAD4D934308C0B99F787C330CA5
Requests: 20 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://cutt.ly/akkKlc
HTTP 301
http://voyageprop.temp.swtest.ru/ Page URL
-
http://a0314669.xsph.ru//assef/
HTTP 302
http://a0314669.xsph.ru//assef/pindex.html?cmd=_account-details&session=faed8a7d7e03ae066a15dbcf9d71... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cutt.ly/akkKlc
HTTP 301
http://voyageprop.temp.swtest.ru/ Page URL
-
http://a0314669.xsph.ru//assef/
HTTP 302
http://a0314669.xsph.ru//assef/pindex.html?cmd=_account-details&session=faed8a7d7e03ae066a15dbcf9d7159e7&dispatch=0d9f7696e7f75e583420f4c49ac6a4a6d9d24f95 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://cutt.ly/akkKlc HTTP 301
- http://voyageprop.temp.swtest.ru/
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
voyageprop.temp.swtest.ru/ Redirect Chain
|
75 B 348 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
pindex.html
a0314669.xsph.ru//assef/ Redirect Chain
|
14 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sanstitre-2.css
a0314669.xsph.ru//assef/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.0/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jepy.js
a0314669.xsph.ru//assef/JS/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clavier.js
a0314669.xsph.ru//assef/JS/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-top-2.png
a0314669.xsph.ru//assef/img/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-right-top1.png
a0314669.xsph.ru//assef/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnp.png
a0314669.xsph.ru//assef/img/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
top-bzo.png
a0314669.xsph.ru//assef/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-label.png
a0314669.xsph.ru//assef/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
del.png
a0314669.xsph.ru//assef/img/ |
840 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2-label.png
a0314669.xsph.ru//assef/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zbalo.png
a0314669.xsph.ru//assef/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
right.png
a0314669.xsph.ru//assef/img/ |
95 KB 96 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footers-txt.png
a0314669.xsph.ru//assef/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
list-foter1.png
a0314669.xsph.ru//assef/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
list-foter2.png
a0314669.xsph.ru//assef/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
list-foter3.png
a0314669.xsph.ru//assef/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
list-foter4.png
a0314669.xsph.ru//assef/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNP Paribas (Banking)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| hidah function| showing function| deletepassID function| deleteID function| addCode function| emptyCode function| validate function| validateForm function| king boolean| encodeXor function| encodeBase64LCL function| myXOR function| createCookie function| readCookie function| saveIdentifiant function| removeIdentifiant function| saveIdentifiantBel boolean| flag0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a0314669.xsph.ru
ajax.googleapis.com
cutt.ly
voyageprop.temp.swtest.ru
2a00:1450:4001:814::200a
2a0a:2b43:7b:62da::
46.248.190.217
77.222.40.199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