banking.bindigobank.net
Open in
urlscan Pro
45.143.136.23
Malicious Activity!
Public Scan
Submission: On August 12 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 9th 2022. Valid for: 3 months.
This is the only time banking.bindigobank.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 45.143.136.23 45.143.136.23 | 47196 (GARANT-PA...) (GARANT-PARK-INTERNET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
15 | 2 |
ASN47196 (GARANT-PARK-INTERNET, RU)
PTR: simromorrata.example.com
banking.bindigobank.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
bindigobank.net
banking.bindigobank.net |
440 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 615 |
30 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
14 | banking.bindigobank.net |
banking.bindigobank.net
code.jquery.com |
1 | code.jquery.com |
banking.bindigobank.net
|
15 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
banking.bindigobank.net R3 |
2022-08-09 - 2022-11-07 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://banking.bindigobank.net/Logon/login.page
Frame ID: DCC7547EC9B459722CDB2D0F43CA771B
Requests: 15 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.page
banking.bindigobank.net/Logon/ |
38 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
stylesheet.css
banking.bindigobank.net/images/au/bendigobank.com.au/fonts/ |
16 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
banking.bindigobank.net/images/au/bendigobank.com.au/css/ |
421 KB 105 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery3.js.php
banking.bindigobank.net/js/ |
59 KB 21 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Bendigo.js
banking.bindigobank.net/js/au/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flash-detect.js
banking.bindigobank.net/js/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Bendigo_aj.js
banking.bindigobank.net/js/au/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader.gif
banking.bindigobank.net/images/au/bendigobank.com.au/images/ |
118 KB 119 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
banking.bindigobank.net/images/au/bendigobank.com.au/js/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kb-banner.jpg
banking.bindigobank.net/images/au/bendigobank.com.au/images/ |
69 KB 69 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProximaNova-Regular.woff
banking.bindigobank.net/images/au/bendigobank.com.au/fonts/ |
51 KB 51 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProximaNova-Bold.woff
banking.bindigobank.net/images/au/bendigobank.com.au/fonts/ |
51 KB 51 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
banking.bindigobank.net/bendigo/ |
50 B 651 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
banking.bindigobank.net/bendigo/ |
50 B 651 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
August 12th 2022, 7:36:39 am
UTC —
From Australia
Threats:
Phishing
Brands:
Bendigo Bank
AU
Comment: confirmed phishing site targeting bendigo bank
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)37 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation string| checkCode function| $ function| jQuery boolean| isRequestSent boolean| isActiveCheckRefresh object| lastRequest number| lastRequestTime number| minRequestInterval function| repeatCheck object| getBodyExpr function| checkRefresh object| getScriptDelimitersExpr function| deleteScripts function| setCameraState string| camera object| FlashDetect object| webcam function| checkForms function| checkImei function| AJAJsendForm function| showFormSentMessage function| getFormData function| sendData function| openpage function| afterclick number| page function| buttonAnim function| slideForm number| setVars0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banking.bindigobank.net
code.jquery.com
2001:4de0:ac18::1:a:2a
45.143.136.23
14d08e89cdb809352e649dac60cce2eb7a9fc9b79b1334bd2f6950f672578fa7
19e82bbfb9026b14d48ba50b9b2cb9d51472ed958410309b9c247d07c1edb80f
1a7ea63c1ce379c24c291b86863370d66213a1060f661235a38cca123e3aab12
278c3a08182ae92baad64a89d41078403cba2ea85106074dde809945029a95ef
81c6d1a13227777d009f275f5ecb80bd6c780d2843b9b18fe2809ff9822a2066
99a24fdd4e16d8dd4fdd79a5dd2dd7b71c2c68473fd6b3cb4eca4fa3f33d9ac1
9a4e3f5833aeec91ebf1499a4d0a76dde8f4ee666ad981a3e3e5babeb62da01f
b705c7a5dcdd96e1615e1eeeaf8dde9e8545c3a8f3683804304e8cc9874e93c8
c95004c3ccd349ab98e3399fc906b32ff9175ada6c1f8c96eaa33e2f11cd1a6d
d33ab7160d241d0d66c9ed29649dec96c32b3aa812bd1524601acf48cea6a719
e2ef71ceb9784cf0da0d4765128c5c3af5f682b140ff7979ce7513e2ac58e5f2
f5167ccf97314839edad34364bfb4987c8cc36805c4df0653f6c288f19e56e63
fdb6955aa0dd5647cc6088137ec5a198d07a5c6051e5416ccf06fa10412c3888
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e