virtual-sac2020.tk
Open in
urlscan Pro
40.112.209.195
Malicious Activity!
Public Scan
Submission: On October 27 via manual from IN
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on October 4th 2020. Valid for: 3 months.
This is the only time virtual-sac2020.tk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Itau (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 40.112.209.195 40.112.209.195 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
11 | 1 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
virtual-sac2020.tk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
virtual-sac2020.tk
virtual-sac2020.tk |
220 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | virtual-sac2020.tk |
virtual-sac2020.tk
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
virtual-sac2020.tk Let's Encrypt Authority X3 |
2020-10-04 - 2021-01-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://virtual-sac2020.tk/home.php
Frame ID: 0D939848894E986CBAA649397BC7E725
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
home.php
virtual-sac2020.tk/ |
2 KB 1020 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.min.js
virtual-sac2020.tk/js/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.min.js
virtual-sac2020.tk/js/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home_scripts.js
virtual-sac2020.tk/js/ |
1 KB 798 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home_style.css
virtual-sac2020.tk/assets/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img_home_logo.png
virtual-sac2020.tk/assets/imagenss/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_contact_card.png
virtual-sac2020.tk/assets/imagenss/ |
503 B 787 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_itokenapp.png
virtual-sac2020.tk/assets/imagenss/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_ajuda.png
virtual-sac2020.tk/assets/imagenss/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img_home_bg.png
virtual-sac2020.tk/assets/imagenss/ |
175 KB 176 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_cadeado.png
virtual-sac2020.tk/assets/imagenss/ |
783 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Itau (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery function| passballs function| validatebt function| validatecc0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
virtual-sac2020.tk
40.112.209.195
296e7462400a0216f855253d548dd789c13d9e846b38dce6f0c9dce384fc5510
3b28fd611f0f51576757693edb78d14b162007c819945963b8ea339a456f5404
7128b3163ef3d75f3f7f7e803b65a7bbfbf480c880c7a815c33ea82d549e630d
7567ac56d5b7f15cc4d6cb7c15524f12039dfec5d7834364f58823545500659e
75851533db3fda044c3fe2bdfbb1dfdf808586387493fc5b3395ba8400391046
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
915e3aea1eda6df53467eb792f487578c127d19740a1eb669d6dba7d2435edb4
bfbf3fc25fb56572d3aa2c94f156f67f48186a575d5627c46728c5e5b406ef35
c45b52e175c6afcbd1488c2d0ddb88efea8ef432b535099aa760f0446a146cfd
d33cfca923e87510e2837231c77985de89f00f0ba8bf8b4e86bf7086f38514c6
f830833b6661d5fb63e23d3d245e91edc7c52aa547ca19eca7c91c7570483975