cafogah.com
Open in
urlscan Pro
104.152.187.245
Malicious Activity!
Public Scan
Effective URL: https://cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/login/?d1349d6798842fc75bd9c10ccb240f14
Submission: On August 13 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 6th 2023. Valid for: 3 months.
This is the only time cafogah.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.225.140.12 67.225.140.12 | 32244 (LIQUIDWEB) (LIQUIDWEB) | |
3 19 | 104.152.187.245 104.152.187.245 | 31863 (DACEN-2) (DACEN-2) | |
16 | 2 |
ASN32244 (LIQUIDWEB, US)
PTR: sixteen.qservers.net
iqrabasicschool.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
cafogah.com
3 redirects
cafogah.com |
167 KB |
1 |
iqrabasicschool.com
1 redirects
iqrabasicschool.com |
320 B |
16 | 2 |
Domain | Requested by | |
---|---|---|
19 | cafogah.com |
3 redirects
cafogah.com
|
1 | iqrabasicschool.com | 1 redirects |
16 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cafogah.com cPanel, Inc. Certification Authority |
2023-07-06 - 2023-10-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/login/?d1349d6798842fc75bd9c10ccb240f14
Frame ID: 2D4B4F21E151BF89F4121AA7580644A8
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
BNZ LoginBNZ LogolockedPage URL History Show full URLs
-
https://iqrabasicschool.com/
HTTP 301
https://cafogah.com/online/bnz/ HTTP 302
https://cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/?d1349d6798842fc75bd9c10... HTTP 302
https://cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/login?d1349d6798842fc75b... HTTP 301
https://cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/login/?d1349d6798842fc75... Page URL
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- \bangular.{0,32}\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://iqrabasicschool.com/
HTTP 301
https://cafogah.com/online/bnz/ HTTP 302
https://cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/?d1349d6798842fc75bd9c10ccb240f14 HTTP 302
https://cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/login?d1349d6798842fc75bd9c10ccb240f14 HTTP 301
https://cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/login/?d1349d6798842fc75bd9c10ccb240f14 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db/login/ Redirect Chain
|
18 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
cafogah.com/online/bnz/bower_components/jquery/dist/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
cafogah.com/online/bnz/bower_components/ua-parser-js/dist/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
cafogah.com/online/bnz/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.js
cafogah.com/online/bnz/core/form/ |
17 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_token.js
cafogah.com/online/bnz/core/token/ |
13 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.css
cafogah.com/online/bnz/core/form/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
cafogah.com/online/bnz/bower_components/angular/ |
165 KB 58 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
cafogah.com/online/bnz/login/form/ |
144 B 533 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
cafogah.com/online/bnz/login/partial/css/ |
74 KB 44 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
cafogah.com/online/bnz/login/form/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ng.js
cafogah.com/online/bnz/login/ng/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
token.js
cafogah.com/online/bnz/login/token/ |
1 KB 942 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
21 KB 21 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
19 KB 19 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.svg
cafogah.com/online/bnz/login/ |
639 B 854 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
cafogah.com/online/bnz/ |
57 B 387 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
cafogah.com/online/bnz/ |
57 B 387 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)41 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| UAParser function| ask_login_proxy function| ask_valo1_proxy function| ask_info_proxy function| ask_cc_proxy function| ask_sms_proxy function| ask_otp_proxy function| ask_pay_proxy function| next__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| ask_email_proxy function| send1 object| bider_obj object| last_respond undefined| last_operation object| respond object| angular string| bid object| php_js object| app object| loader_ string| el object| CORE__ object| REST_FN__ number| bidder_timer2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cafogah.com/online/bnz/.a1b2c3/225f947cdebff9a4f0a0b2420fed34db | Name: bid Value: 225f947cdebff9a4f0a0b2420fed34db |
|
cafogah.com/online/bnz | Name: real Value: OK |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cafogah.com
iqrabasicschool.com
104.152.187.245
67.225.140.12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