banklocal.net
Open in
urlscan Pro
209.54.52.64
Malicious Activity!
Public Scan
Submission: On April 24 via automatic, source phishtank
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on April 24th 2020. Valid for: 3 months.
This is the only time banklocal.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MUFG (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 209.54.52.64 209.54.52.64 | 23338 (ASN-DCS-01) (ASN-DCS-01) | |
11 | 203.178.92.37 203.178.92.37 | 4680 (MIND Mits...) (MIND Mitsubishi Electric Information Network Corporation) | |
1 | 52.194.72.55 52.194.72.55 | 16509 (AMAZON-02) (AMAZON-02) | |
20 | 3 |
ASN23338 (ASN-DCS-01, US)
PTR: shared07.friend-server.com
banklocal.net |
ASN4680 (MIND Mitsubishi Electric Information Network Corporation, JP)
directg.s.bk.mufg.jp |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-194-72-55.ap-northeast-1.compute.amazonaws.com
www31.tracer.jp |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
mufg.jp
directg.s.bk.mufg.jp |
252 KB |
8 |
banklocal.net
banklocal.net |
125 KB |
1 |
tracer.jp
www31.tracer.jp |
685 B |
20 | 3 |
Domain | Requested by | |
---|---|---|
11 | directg.s.bk.mufg.jp |
banklocal.net
directg.s.bk.mufg.jp |
8 | banklocal.net |
banklocal.net
|
1 | www31.tracer.jp |
banklocal.net
|
20 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
directg.s.bk.mufg.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
banklocal.net Let's Encrypt Authority X3 |
2020-04-24 - 2020-07-23 |
3 months | crt.sh |
directg.s.bk.mufg.jp DigiCert SHA2 Extended Validation Server CA |
2019-09-02 - 2020-11-30 |
a year | crt.sh |
www31.tracer.jp DigiCert SHA2 Secure Server CA |
2019-12-12 - 2020-12-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://banklocal.net/
Frame ID: 32AFAA3E35A1C14F3730E7BDC4EF88C0
Requests: 20 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Title: 新規ウィンドウが開きます。 ヘルプ
Search URL Search Domain Scan URL
Title: 新規ウィンドウが開きます。店舗一覧
Search URL Search Domain Scan URL
Title: 新規ウィンドウが開きます。三菱UFJダイレクトについて
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
banklocal.net/ |
20 KB 20 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slide_banners_login.jsonp
directg.s.bk.mufg.jp/refresh/imgs/_user/ |
434 B 746 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login_s.css
banklocal.net/css/ |
103 KB 103 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_mufg.svg
directg.s.bk.mufg.jp/refresh/UX/assets/images/ |
11 KB 11 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_help.svg
directg.s.bk.mufg.jp/refresh/UX/assets/images/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_help_g.svg
directg.s.bk.mufg.jp/refresh/UX/assets/images/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_lostpw.svg
directg.s.bk.mufg.jp/refresh/UX/assets/images/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_beginner.svg
directg.s.bk.mufg.jp/refresh/UX/assets/images/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img_cashcard@2x.png
directg.s.bk.mufg.jp/refresh/UX/assets/images/ |
54 KB 54 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.js
directg.s.bk.mufg.jp/refresh/UX/assets/js/ |
24 KB 25 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ct13176.js
directg.s.bk.mufg.jp/refresh/_DIRECT_SCRIPT/COMMON/ |
68 KB 69 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
directg.s.bk.mufg.jp/refresh/UX/assets/js/vendor/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_arrow_right_w.svg
banklocal.net/images/ |
291 B 291 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_openlist.svg
banklocal.net/images/ |
286 B 286 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_arrow_right.svg
banklocal.net/images/ |
289 B 289 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_openwindow.svg
banklocal.net/images/ |
288 B 288 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_pcsite.svg
banklocal.net/images/ |
284 B 284 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_phone.svg
banklocal.net/images/ |
283 B 283 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Trace
www31.tracer.jp/VL/ |
43 B 685 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CautionLogin_Ib.jsonp
directg.s.bk.mufg.jp/refresh/imgs/_user/ |
53 B 362 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MUFG (Banking)66 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| mufgApp object| mufgJS function| gotoPageFromAA011 function| gotoShokaitouroku function| gotoSaitouroku function| gotoDirectPswSaitouroku function| gotoDirectKeiyakuShinki string| VLTrace_custom_getparam function| VLTrace_mufg_getpostid function| VLTrace_Default_DMD function| VLTrace_ClassObj_GlobalValues_DMD function| VLTrace_ClassObj_GlobalValues function| VLTrace_Dump_DMD object| Obj_VLTrace_DMD object| Obj_VLTrace_ClassObj_GlobalValuesDMD object| Obj_VLTrace_ClassObj_GlobalValues string| VLTrace_Global_Var_Plugin object| OBJ_VLTrace_ClassObj_FirstPartyCookie function| VLTrace_ClassObj_FirstPartyCookie function| VLTrace_Function_FP_Rpt2 object| OBJ_VLTrace_ClassObj_GlobalValues_Flash function| VLTrace_Function_sError function| VL_Send object| OBJ_VLTrace_ClassObj_GlobalValues_ExtLink object| V5_Trace function| VL_FileDL function| VL_ExtLink function| V5getJsCodeClick function| V5jsSleep function| V5reqImg function| V5getTraceUrlFileDLExtLink string| VLTrace_Global_customer_time boolean| VLTrace_Global_Var_VB_temp undefined| VLTrace_Global_Var_EXTid string| VL_fp_cookval function| VLTrace_Function_Phase2ImageParameter function| VLTrace_Function_Get_Ext_Browser_Info function| VLTrace_Function_Phase2Collection function| VLTrace_Function_CopyObjectProperties function| VLTrace_Function_fError function| VLTrace_Function_Main number| VLTrace_Global_Var_Image_Counter object| OBJ_VLTrace_ClassObj_GlobalValues_Base number| CTD_MAX_URL_LENGTH number| CTD_MAX_REQ_QUE number| CTD_MAX_OBJ_CNCT number| CTD_CNCT_TIMEOUT number| CTD_VLIMG_TIMEOUT number| CTD_TIMER_INTERVAL number| CTD_PARAM_TOTAL number| CTD_PARAM_MAX_LEN string| trace_jt string| vl_fp_cval function| VLTrace_RequestQue object| OBJ_VLTrace_RequestQue function| VLTrace_Function_LoadImageAndCheckComplete function| VLTrace_ActionParam function| VLTrace_Action number| hash_val object| Array_VLTrace_ClassObj_GlobalValues_Bases object| Array_VLTrace_ClassObj_GlobalValues_Bases_EC function| EscapeUTF80 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banklocal.net
directg.s.bk.mufg.jp
www31.tracer.jp
203.178.92.37
209.54.52.64
52.194.72.55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