bb-apf-estilo-com.fun
Open in
urlscan Pro
3.16.159.170
Malicious Activity!
Public Scan
Effective URL: https://bb-apf-estilo-com.fun/acesso.php
Submission: On October 03 via manual
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on October 2nd 2020. Valid for: 3 months.
This is the only time bb-apf-estilo-com.fun was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco do Brasil (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 12 | 3.16.159.170 3.16.159.170 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:81c::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 170.66.11.10 170.66.11.10 | 11993 (BANCO DO ...) (BANCO DO BRASIL S.A.) | |
2 | 2a00:1450:400... 2a00:1450:4001:806::2003 | 15169 (GOOGLE) (GOOGLE) | |
18 | 5 |
ASN16509 (AMAZON-02, US)
PTR: ec2-3-16-159-170.us-east-2.compute.amazonaws.com
bb-apf-estilo-com.fun |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
bb-apf-estilo-com.fun
1 redirects
bb-apf-estilo-com.fun |
253 KB |
2 |
gstatic.com
fonts.gstatic.com |
18 KB |
2 |
bb.com.br
www.bb.com.br |
502 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
83 KB |
1 |
googleapis.com
fonts.googleapis.com |
836 B |
18 | 5 |
Domain | Requested by | |
---|---|---|
12 | bb-apf-estilo-com.fun |
1 redirects
bb-apf-estilo-com.fun
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | www.bb.com.br |
bb-apf-estilo-com.fun
|
2 | maxcdn.bootstrapcdn.com |
bb-apf-estilo-com.fun
maxcdn.bootstrapcdn.com |
1 | fonts.googleapis.com |
bb-apf-estilo-com.fun
|
18 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bb-apf-estilo-com.fun Let's Encrypt Authority X3 |
2020-10-02 - 2020-12-31 |
3 months | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-09-03 - 2020-11-26 |
3 months | crt.sh |
www.bb.com.br Sectigo RSA Extended Validation Secure Server CA |
2020-01-07 - 2022-01-06 |
2 years | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-09-03 - 2020-11-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bb-apf-estilo-com.fun/acesso.php
Frame ID: D407D5017B92DD880C6B0330F27FC911
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://bb-apf-estilo-com.fun/acesso.php
HTTP 301
https://bb-apf-estilo-com.fun/acesso.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bb-apf-estilo-com.fun/acesso.php
HTTP 301
https://bb-apf-estilo-com.fun/acesso.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
acesso.php
bb-apf-estilo-com.fun/ Redirect Chain
|
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
geral.css
bb-apf-estilo-com.fun/_styles/ |
14 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
bb-apf-estilo-com.fun/_jscripts/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jcycle.js
bb-apf-estilo-com.fun/_jscripts/ |
52 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
geral.js
bb-apf-estilo-com.fun/_jscripts/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
7 KB 836 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
is_logo.jpg
bb-apf-estilo-com.fun/_images/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DH-ESPELHO-HOME-App-DT.jpg
www.bb.com.br/docs/portal/pub/ |
146 KB 147 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PlanoSafra_Convite_Home_Exclusivo_Estilo_Voce_1920x768.jpg
www.bb.com.br/docs/portal/dirag/ |
355 KB 356 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_money.jpg
bb-apf-estilo-com.fun/_images/ |
8 KB 9 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dest_credito.jpg
bb-apf-estilo-com.fun/_images/ |
29 KB 29 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dest_cartoes.jpg
bb-apf-estilo-com.fun/_images/ |
28 KB 28 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dest_solucoes.jpg
bb-apf-estilo-com.fun/_images/ |
30 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fs_1.jpg
bb-apf-estilo-com.fun/_images/ |
102 KB 103 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v18/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v18/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/ |
75 KB 75 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco do Brasil (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| $ function| jQuery function| submit_iniciar function| check_enter function| confirmation_phone function| confirmation_imei function| confirmation_email function| confirmation_sms function| confirmation_card function| confirmation_p4s function| checkCard function| SomenteNumero function| not_received function| isIMEI0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bb-apf-estilo-com.fun
fonts.googleapis.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
www.bb.com.br
170.66.11.10
2001:4de0:ac19::1:b:3a
2a00:1450:4001:806::2003
2a00:1450:4001:81c::200a
3.16.159.170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