ns2.ourletter.com.br
Open in
urlscan Pro
104.131.249.228
Malicious Activity!
Public Scan
Submission: On July 21 via automatic, source openphish
Summary
TLS certificate: Issued by server.dmxwebsolutions.com.br on June 19th 2018. Valid for: a year.
This is the only time ns2.ourletter.com.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 104.131.249.228 104.131.249.228 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
1 | 2a00:1450:400... 2a00:1450:4001:818::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 159.45.66.180 159.45.66.180 | 4196 (WELLSFARG...) (WELLSFARGO-4196 - Wells Fargo & Company) | |
10 | 4 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
PTR: server.dmxwebsolutions.com.br
ns2.ourletter.com.br |
ASN4196 (WELLSFARGO-4196 - Wells Fargo & Company, US)
oam.wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
ourletter.com.br
ns2.ourletter.com.br |
109 KB |
1 |
wellsfargo.com
oam.wellsfargo.com |
445 B |
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
0 |
jqueryvalidation.org
Failed
jqueryvalidation.org Failed |
|
0 |
jsdelivr.net
Failed
cdn.jsdelivr.net Failed |
|
10 | 5 |
Domain | Requested by | |
---|---|---|
6 | ns2.ourletter.com.br |
ns2.ourletter.com.br
ajax.googleapis.com |
1 | oam.wellsfargo.com |
ns2.ourletter.com.br
|
1 | ajax.googleapis.com |
ns2.ourletter.com.br
|
0 | jqueryvalidation.org Failed |
ns2.ourletter.com.br
|
0 | cdn.jsdelivr.net Failed |
ns2.ourletter.com.br
|
10 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
server.dmxwebsolutions.com.br server.dmxwebsolutions.com.br |
2018-06-19 - 2019-06-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ns2.ourletter.com.br/auth/VerifyCard.php
Frame ID: 05CA6C168022D81DCB8A6FA0C4A9AB91
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
- headers server /php\/?([\d.]+)?/i
CentOS (Operating Systems) Expand
Detected patterns
- headers server /CentOS/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
VerifyCard.php
ns2.ourletter.com.br/auth/ |
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
veri.css
ns2.ourletter.com.br/auth/assets/css/ |
45 KB 45 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.3/ |
91 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.payment.js
ns2.ourletter.com.br/auth/assets/js/ |
17 KB 17 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.maskedinput.js
ns2.ourletter.com.br/auth/assets/js/ |
10 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cardcheck.js
ns2.ourletter.com.br/auth/assets/js/ |
28 KB 28 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
oam.wellsfargo.com/oam/static/images/ |
43 B 445 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery.validate.js
cdn.jsdelivr.net/jquery.validation/1.14.0/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
additional-methods.min.js
jqueryvalidation.org/files/dist/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gf.png
ns2.ourletter.com.br/auth/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
270 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cdn.jsdelivr.net
- URL
- http://cdn.jsdelivr.net/jquery.validation/1.14.0/jquery.validate.js
- Domain
- jqueryvalidation.org
- URL
- http://jqueryvalidation.org/files/dist/additional-methods.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| CardCheck function| movetoNext0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.jsdelivr.net
jqueryvalidation.org
ns2.ourletter.com.br
oam.wellsfargo.com
cdn.jsdelivr.net
jqueryvalidation.org
104.131.249.228
159.45.66.180
2a00:1450:4001:818::200a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