![](/screenshots/76e27c2e-f7b8-449f-915a-090ef356b5bf.png)
f26e3757d62043d287f7f8a2642df56c.yatu.ws
Open in
urlscan Pro
2001:4b99:1:253::14
Malicious Activity!
Public Scan
Effective URL: http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/myaccount/personal/personal-login.php?enc=04...
Submission: On June 09 via api from NZ
Summary
This is the only time f26e3757d62043d287f7f8a2642df56c.yatu.ws was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 7 | 2001:4b99:1:2... 2001:4b99:1:253::14 | 203476 (GANDI-AS-...) (GANDI-AS-2 Domain name registrar - http://www.gandi.net) | |
4 | 52.201.107.186 52.201.107.186 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
5 | 45.60.78.175 45.60.78.175 | 19551 (INCAPSULA) (INCAPSULA - Incapsula Inc) | |
12 | 3 |
ASN203476 (GANDI-AS-2 Domain name registrar - http://www.gandi.net, FR)
f26e3757d62043d287f7f8a2642df56c.yatu.ws |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-201-107-186.compute-1.amazonaws.com
execution-use.ci360.sas.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
yatu.ws
4 redirects
f26e3757d62043d287f7f8a2642df56c.yatu.ws |
10 KB |
5 |
bnz.co.nz
www.bnz.co.nz m.bnz.co.nz |
42 KB |
4 |
sas.com
execution-use.ci360.sas.com |
74 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
7 | f26e3757d62043d287f7f8a2642df56c.yatu.ws |
4 redirects
f26e3757d62043d287f7f8a2642df56c.yatu.ws
|
4 | www.bnz.co.nz |
f26e3757d62043d287f7f8a2642df56c.yatu.ws
|
4 | execution-use.ci360.sas.com |
f26e3757d62043d287f7f8a2642df56c.yatu.ws
|
1 | m.bnz.co.nz |
f26e3757d62043d287f7f8a2642df56c.yatu.ws
|
12 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bnz.co.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.ci360.sas.com DigiCert SHA2 Secure Server CA |
2019-04-23 - 2021-07-22 |
2 years | crt.sh |
www.bnz.co.nz Entrust Certification Authority - L1M |
2019-04-11 - 2020-05-05 |
a year | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/myaccount/personal/personal-login.php?enc=0493fb623b81ac5789f2695765b211c4&p=0&dispatch=ade8f64a75a192c44b92f6eb7a7c79dd613e8812
Frame ID: F244C2C5E6F6FA3236CEE8A083F1EE2E
Requests: 12 HTTP requests in this frame
Screenshot
![](/screenshots/76e27c2e-f7b8-449f-915a-090ef356b5bf.png)
Page URL History Show full URLs
-
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/
HTTP 302
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182 HTTP 301
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/ HTTP 302
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/myaccount/personal/?coun... HTTP 302
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/myaccount/personal/perso... Page URL
Detected technologies
Detected patterns
- headers via /.*Varnish/i
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/
HTTP 302
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182 HTTP 301
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/ HTTP 302
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/myaccount/personal/?country.x=DE&locale.x=en_DE HTTP 302
http://f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/myaccount/personal/personal-login.php?enc=0493fb623b81ac5789f2695765b211c4&p=0&dispatch=ade8f64a75a192c44b92f6eb7a7c79dd613e8812 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
personal-login.php
f26e3757d62043d287f7f8a2642df56c.yatu.ws/personalll/customer_center/customer_Case=IDPP00C182/myaccount/personal/ Redirect Chain
|
54 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ot-min.js
execution-use.ci360.sas.com/js/ |
226 KB 62 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1541300958852
execution-use.ci360.sas.com/t/s/c/c0b52ff90d000139628464bd/ |
36 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c0b52ff90d000139628464bd
execution-use.ci360.sas.com/t/s/p/ |
87 B 472 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
serrano.css
www.bnz.co.nz/serrano/ |
2 KB 902 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout.png
m.bnz.co.nz/pa/oidc/ |
70 B 562 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout.png
www.bnz.co.nz/pa/oidc/ |
70 B 644 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c0b52ff90d000139628464bd
execution-use.ci360.sas.com/t/s/s/ |
11 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.a88c18e8.js
f26e3757d62043d287f7f8a2642df56c.yatu.ws/auth/static/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.a88c18e8.js
f26e3757d62043d287f7f8a2642df56c.yatu.ws/auth/static/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Bold.woff2
www.bnz.co.nz/serrano/fonts/ |
21 KB 21 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Regular.woff2
www.bnz.co.nz/serrano/fonts/ |
19 KB 19 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask boolean| isUnsupportedBrowser object| OLA_DOMAINS function| e399 object| com_sas_ci_acs string| expires function| E1EE function| R1EE object| c3 object| Hashcode object| GeneralBase64 object| Base64 object| spotMap object| dataTagToEventMap function| windowFocused function| windowBlured function| LocalQueue object| CryptoJS function| getDecisionParams function| loadDoc function| extractValue function| handleInjectResponse function| overridePrototypes function| onYouTubeIframeAPIReady function| onYouTubePlayerReady1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
f26e3757d62043d287f7f8a2642df56c.yatu.ws/ | Name: PHPSESSID Value: 5lrv3m9i2qkel55umao6i6td5n |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
execution-use.ci360.sas.com
f26e3757d62043d287f7f8a2642df56c.yatu.ws
m.bnz.co.nz
www.bnz.co.nz
2001:4b99:1:253::14
45.60.78.175
52.201.107.186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