59949c760470474f995b7a1b0dd41a5a.yatu.ws
Open in
urlscan Pro
2001:4b99:1:253::8
Malicious Activity!
Public Scan
Submission: On June 09 via manual from US
Summary
This is the only time 59949c760470474f995b7a1b0dd41a5a.yatu.ws was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 2001:4b99:1:2... 2001:4b99:1:253::8 | 203476 (GANDI-AS-...) (GANDI-AS-2 Domain name registrar - http://www.gandi.net) | |
4 | 52.201.107.186 52.201.107.186 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
5 | 45.60.78.175 45.60.78.175 | 19551 (INCAPSULA) (INCAPSULA - Incapsula Inc) | |
12 | 3 |
ASN203476 (GANDI-AS-2 Domain name registrar - http://www.gandi.net, FR)
59949c760470474f995b7a1b0dd41a5a.yatu.ws |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-201-107-186.compute-1.amazonaws.com
execution-use.ci360.sas.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
bnz.co.nz
www.bnz.co.nz m.bnz.co.nz |
42 KB |
4 |
sas.com
execution-use.ci360.sas.com |
74 KB |
3 |
yatu.ws
59949c760470474f995b7a1b0dd41a5a.yatu.ws |
8 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
4 | www.bnz.co.nz |
59949c760470474f995b7a1b0dd41a5a.yatu.ws
|
4 | execution-use.ci360.sas.com |
59949c760470474f995b7a1b0dd41a5a.yatu.ws
|
3 | 59949c760470474f995b7a1b0dd41a5a.yatu.ws |
59949c760470474f995b7a1b0dd41a5a.yatu.ws
|
1 | m.bnz.co.nz |
59949c760470474f995b7a1b0dd41a5a.yatu.ws
|
12 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bnz.co.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.ci360.sas.com DigiCert SHA2 Secure Server CA |
2019-04-23 - 2021-07-22 |
2 years | crt.sh |
www.bnz.co.nz Entrust Certification Authority - L1M |
2019-04-11 - 2020-05-05 |
a year | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://59949c760470474f995b7a1b0dd41a5a.yatu.ws/personal/personal/customer_center/customer_Case=IDPP00C197/myaccount/personal/personal-login.php?enc=82bedcd380701acc0b1ebd1b6c1b1a84&p=0&dispatch=20c2aa2d230f1b4bb49fcec7a5ad67b7341bee2f
Frame ID: AAAB13FF73EB1EFE7B42F95141051FB6
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Varnish (Cache Tools) Expand
Detected patterns
- headers via /.*Varnish/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
personal-login.php
59949c760470474f995b7a1b0dd41a5a.yatu.ws/personal/personal/customer_center/customer_Case=IDPP00C197/myaccount/personal/ |
54 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ot-min.js
execution-use.ci360.sas.com/js/ |
226 KB 62 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1541300958852
execution-use.ci360.sas.com/t/s/c/c0b52ff90d000139628464bd/ |
36 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c0b52ff90d000139628464bd
execution-use.ci360.sas.com/t/s/p/ |
87 B 472 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
serrano.css
www.bnz.co.nz/serrano/ |
2 KB 901 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout.png
m.bnz.co.nz/pa/oidc/ |
70 B 643 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout.png
www.bnz.co.nz/pa/oidc/ |
70 B 565 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c0b52ff90d000139628464bd
execution-use.ci360.sas.com/t/s/s/ |
11 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.a88c18e8.js
59949c760470474f995b7a1b0dd41a5a.yatu.ws/auth/static/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.a88c18e8.js
59949c760470474f995b7a1b0dd41a5a.yatu.ws/auth/static/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Bold.woff2
www.bnz.co.nz/serrano/fonts/ |
21 KB 21 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Regular.woff2
www.bnz.co.nz/serrano/fonts/ |
19 KB 19 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask boolean| isUnsupportedBrowser object| OLA_DOMAINS function| e399 object| com_sas_ci_acs string| expires function| E1EE function| R1EE object| c3 object| Hashcode object| GeneralBase64 object| Base64 object| spotMap object| dataTagToEventMap function| windowFocused function| windowBlured function| LocalQueue object| CryptoJS function| getDecisionParams function| loadDoc function| extractValue function| handleInjectResponse function| overridePrototypes function| onYouTubeIframeAPIReady function| onYouTubePlayerReady0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
59949c760470474f995b7a1b0dd41a5a.yatu.ws
execution-use.ci360.sas.com
m.bnz.co.nz
www.bnz.co.nz
2001:4b99:1:253::8
45.60.78.175
52.201.107.186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