www.msk.shkaf-servis.ru
Open in
urlscan Pro
217.112.35.48
Malicious Activity!
Public Scan
Submission: On May 08 via automatic, source openphish
Summary
This is the only time www.msk.shkaf-servis.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
18 | 217.112.35.48 217.112.35.48 | 30943 (UTRANSIT-...) (UTRANSIT-AS Utransit Global Backbone Network) | |
18 | 1 |
ASN30943 (UTRANSIT-AS Utransit Global Backbone Network, GB)
PTR: v80-u.valuehost.ru
www.msk.shkaf-servis.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
shkaf-servis.ru
www.msk.shkaf-servis.ru |
225 KB |
18 | 1 |
Domain | Requested by | |
---|---|---|
18 | www.msk.shkaf-servis.ru |
www.msk.shkaf-servis.ru
|
18 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
oam.wellsfargo.com |
www.wellsfargo.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page.html
Frame ID: 73A48E26B77EDD32B9299E74328BD730
Requests: 18 HTTP requests in this frame
Screenshot
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Ionicons (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+ionicons(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Home
Search URL Search Domain Scan URL
Title: Privacy, Security & Legal
Search URL Search Domain Scan URL
Title: Exit
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
inner_page.html
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/ |
20 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mob_enroll.css
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
28 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ionicons.min.css
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
33 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enrollment.css
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.8.3.js.download
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
260 KB 95 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_home.png
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf-logo.gif
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WellsFargo_xhdpi.png
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
criterror_12x12.gif
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
212 B 481 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js.download
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
94 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WF_jquery.plugins.js.download
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
12 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fpa_utils.js.download
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
35 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mob_enroll.js.download
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
59 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
respond.min.js.download
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
4 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
browser_detect.js.download
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
2 KB 831 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajax_loader.gif
www.msk.shkaf-servis.ru/administrator/wells%20fargo%20last%20v%202018/1/inner_page_files/ |
30 KB 30 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-footer.png
www.msk.shkaf-servis.ru/oamo/static/images/ |
828 B 828 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajax_loader.gif
www.msk.shkaf-servis.ru/oamo/images/ |
828 B 828 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery number| timeout object| errorMessages string| contextPath object| Utils function| UAParser function| FastClick boolean| deviceIsAndroid boolean| deviceIsIOS boolean| deviceIsIOS4 boolean| deviceIsIOSWithBadTarget boolean| deviceIsBlackBerry10 function| isMobile object| usernameAlt object| MobileEnroll object| jQuery1112035920658189506915 object| respond object| BrowserDetect0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.msk.shkaf-servis.ru
217.112.35.48
0186ed0d7a00f1e88d588f1a0ba30857e566e88738ff60b5772e941b0c20cf0a
0ee032448e5742e2808da6557a5aac1c68d4f99abb0eb06af5b9ff992ed800c9
233a42a7a10e344ec81ff805b2123fc0dbf5c02a4501b56f83feb76ab9a5ab7a
2ecd295d295bec062cedebe177e54b9d6b19fc0a841dc5c178c654c9ccff09c0
31f551d5105ac925712de76701bc905ca2ea168bb0dcf8c9c3438915c12ca71e
5aa8fac16241d907a062422d29c050b0d9408ca4b070f07f8371a846b188ccda
756d7dfac4a35bb57543f677283d6c682e8d704e5350884b27325badd2b3c4a7
82069c15edd6943dfaa59f5ac3f6acc86fd44a28fe925e410ccdcadec194a8ba
8a46f7e1801bbc650201f5fd410d1854ff5e62c284414de48d418bed2f33fc8a
d37bd2b0d972b4d93225150196da6b4b0ba8d1daf224b54ccec32ad5632f5a3f
d8210b3b2c9ad2d8bd05dd8fc1d35832dae70fc03ad144d8ed90666e22721c59
dd4c639d4c2d3ce8b5fe3243f02175db5b299fc122b6086b9e03466fc83b45f8
e664ed48f9defb9d9077aecb84171dcaf41f91db459011b70e2e4bbf3a689a5d
ed4780490f5de158b0733c83ee137bc925a28a86a9e88539f0571a843811b2cb
edc5ee3b590dae17b0eb19063c34680c15ee144d13583d006e6a7976b69cd2db
efd2f4f35eba14f0804f1e02958f8dd59159e0f99f74ed732e738aa1e00c1de3
f716bd402d9fbe1c8f2fa745cd8e2418ede5d701d5deb053d169a6cf3db62a4e