pinu4564ps4t.ru Open in urlscan Pro
103.153.182.185  Malicious Activity! Public Scan

URL: http://pinu4564ps4t.ru/qwsa/smoth/process.html
Submission: On August 12 via manual from US — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 3 HTTP transactions. The main IP is 103.153.182.185, located in Los Angeles, United States and belongs to SNTHOSTINGS-AS-AP SnTHostings, IN. The main domain is pinu4564ps4t.ru.
This is the only time pinu4564ps4t.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
1 103.153.182.185 140947 (SNTHOSTIN...)
2 159.45.2.177 10837 (WELLSFARG...)
3 2
Apex Domain
Subdomains
Transfer
2 wellsfargo.com
apply.wellsfargo.com — Cisco Umbrella Rank: 46463
7 KB
1 pinu4564ps4t.ru
pinu4564ps4t.ru
2 KB
3 2
Domain Requested by
2 apply.wellsfargo.com pinu4564ps4t.ru
1 pinu4564ps4t.ru
3 2

This site contains no links.

Subject Issuer Validity Valid
apply.wellsfargo.com
Wells Fargo Public Trust Certification Authority 01 G2
2022-05-18 -
2023-05-26
a year crt.sh

This page contains 1 frames:

Primary Page: http://pinu4564ps4t.ru/qwsa/smoth/process.html
Frame ID: 64E82CED392289755132C758602374E7
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Wells Fargo - Please wait

Page Statistics

3
Requests

67 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

9 kB
Transfer

7 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request process.html
pinu4564ps4t.ru/qwsa/smoth/
1 KB
2 KB
Document
General
Full URL
http://pinu4564ps4t.ru/qwsa/smoth/process.html
Protocol
HTTP/1.1
Server
103.153.182.185 Los Angeles, United States, ASN140947 (SNTHOSTINGS-AS-AP SnTHostings, IN),
Reverse DNS
103.153.182.185.static.snthostings.com
Software
Apache /
Resource Hash
b9982f2acb5c4fa9272f64b0bf40dd03bba10a7d057994cf6ac32ef1d841180a

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Accept-Ranges
bytes
Connection
Keep-Alive
Content-Length
1336
Content-Type
text/html
Date
Fri, 12 Aug 2022 13:43:53 GMT
Keep-Alive
timeout=5, max=100
Last-Modified
Tue, 14 Dec 2021 00:14:26 GMT
Server
Apache
logo_62sq.gif
apply.wellsfargo.com/img/shared/static/
2 KB
2 KB
Image
General
Full URL
https://apply.wellsfargo.com/img/shared/static/logo_62sq.gif
Requested by
Host: pinu4564ps4t.ru
URL: http://pinu4564ps4t.ru/qwsa/smoth/process.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.45.2.177 , United States, ASN10837 (WELLSFARGO-10837, US),
Reverse DNS
Software
KONICHIWA/1.1 /
Resource Hash
1d75c1532073401f90f2c4a3135126be6b2cfcd7d24af3da75e393a3c2269a81
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://pinu4564ps4t.ru/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36

Response headers

Strict-Transport-Security
max-age=31536000;includeSubDomains
X-Content-Type-Options
nosniff
Last-Modified
Thu, 20 Nov 2014 23:49:37 GMT
Server
KONICHIWA/1.1
ETag
W/"1824-1416527377000"
X-Frame-Options
DENY
Content-Type
image/gif
Date
Fri, 12 Aug 2022 13:43:54 GMT
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=600
Content-Length
1824
X-XSS-Protection
1; mode=block
status_indicator_alone.gif
apply.wellsfargo.com/img/shared/static/
4 KB
5 KB
Image
General
Full URL
https://apply.wellsfargo.com/img/shared/static/status_indicator_alone.gif
Requested by
Host: pinu4564ps4t.ru
URL: http://pinu4564ps4t.ru/qwsa/smoth/process.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.45.2.177 , United States, ASN10837 (WELLSFARGO-10837, US),
Reverse DNS
Software
KONICHIWA/1.1 /
Resource Hash
7b668be16bb8d9c0f50dfaa1cdd6d74bf53b9b1791fa46a2094b4ea275f246c5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://pinu4564ps4t.ru/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36

Response headers

Strict-Transport-Security
max-age=31536000;includeSubDomains
X-Content-Type-Options
nosniff
Last-Modified
Thu, 20 Nov 2014 23:50:15 GMT
Server
KONICHIWA/1.1
ETag
W/"4161-1416527415000"
X-Frame-Options
DENY
Content-Type
image/gif
Date
Fri, 12 Aug 2022 13:43:53 GMT
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=600
Content-Length
4161
X-XSS-Protection
1; mode=block

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation

1 Cookies

Domain/Path Name / Value
apply.wellsfargo.com/ Name: ISD_OSM_COOKIE
Value: cbEsJ6EOths9EFlVL0p/QMrUKfYIP16o1FiDumNmm4Y7jQ76BOfr8r0c6wKQuBte8Nu3OWdGcGovUoQAAAAB

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

apply.wellsfargo.com
pinu4564ps4t.ru
103.153.182.185
159.45.2.177
1d75c1532073401f90f2c4a3135126be6b2cfcd7d24af3da75e393a3c2269a81
7b668be16bb8d9c0f50dfaa1cdd6d74bf53b9b1791fa46a2094b4ea275f246c5
b9982f2acb5c4fa9272f64b0bf40dd03bba10a7d057994cf6ac32ef1d841180a