byashi.com.br
Open in
urlscan Pro
192.185.210.37
Malicious Activity!
Public Scan
Effective URL: https://byashi.com.br/jss/mobile/login.php?&sessionid=c37b7f56301b9f0ed745317dfd3860a6&securessl=true
Submission: On November 29 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 15th 2022. Valid for: 3 months.
This is the only time byashi.com.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) USAA (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 192.185.210.37 192.185.210.37 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
2 | 104.111.229.42 104.111.229.42 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
6 | 2 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: br110-ip21.hostgator.com.br
byashi.com.br |
ASN16625 (AKAMAI-AS, US)
PTR: a104-111-229-42.deploy.static.akamaitechnologies.com
content.usaa.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
byashi.com.br
1 redirects
byashi.com.br |
28 KB |
2 |
usaa.com
content.usaa.com — Cisco Umbrella Rank: 77997 |
3 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | byashi.com.br |
1 redirects
byashi.com.br
|
2 | content.usaa.com |
byashi.com.br
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.byashi.com.br R3 |
2022-10-15 - 2023-01-13 |
3 months | crt.sh |
www.usaa.com DigiCert SHA2 Extended Validation Server CA |
2022-04-05 - 2023-05-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://byashi.com.br/jss/mobile/login.php?&sessionid=c37b7f56301b9f0ed745317dfd3860a6&securessl=true
Frame ID: B6181E69166030DBEB7A02476B684E77
Requests: 6 HTTP requests in this frame
Screenshot
Page Title
Log On to USAA MobilePage URL History Show full URLs
-
https://byashi.com.br/jss/mobile/
HTTP 302
https://byashi.com.br/jss/mobile/login.php?&sessionid=c37b7f56301b9f0ed745317dfd3860a6&securessl=true Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://byashi.com.br/jss/mobile/
HTTP 302
https://byashi.com.br/jss/mobile/login.php?&sessionid=c37b7f56301b9f0ed745317dfd3860a6&securessl=true Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
byashi.com.br/jss/mobile/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MaskedPassword.js
byashi.com.br/jss/mobile/login_files/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aggregator.css
byashi.com.br/jss/mobile/login_files/ |
35 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tridion_DWT.css
byashi.com.br/jss/mobile/login_files/ |
25 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
usaa_mobile_sprite_global.png
content.usaa.com/mcontent/static_assets/Media/ |
938 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
usaa_mobile_social_media_icons.png
content.usaa.com/mcontent/static_assets/Media/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) USAA (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| empty function| change0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
byashi.com.br
content.usaa.com
104.111.229.42
192.185.210.37
2cfdb08c07395b0be65df154f068ade61c1bfad7e3e3e2d0e40b85319fa95825
4db0cfac50e72d4ec015bffcc6f77bed3e2882cfc8451989f519ee3c4b84c20a
995c990d85cd456a0730c3f737446f6c092520c0af833195a3bb2e3c4fc93dc4
9cfae377d27eb106f0fa560f62903bd0b0975efed398cfbaed79de7676d1b386
b16b85be4eb4d23331ea18ea57ac89b7da9b8668743b365849f2fe5a022731c4
bdacd4ea6456c6088b36aba4fc5a6d78ddc2c7fde95873449baeb22b159582c5