unique-illustrious-amaranthus.glitch.me
Open in
urlscan Pro
52.7.248.205
Malicious Activity!
Public Scan
Submission: On November 24 via manual from GB — Scanned from GB
Summary
TLS certificate: Issued by Amazon on February 1st 2022. Valid for: a year.
This is the only time unique-illustrious-amaranthus.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: NatWest (Banking)Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.7.248.205 52.7.248.205 | 14618 (AMAZON-AES) (AMAZON-AES) | |
18 | 2a02:6b8::1da 2a02:6b8::1da | 208722 (GLOBAL_DC) (GLOBAL_DC) | |
25 | 3 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-7-248-205.compute-1.amazonaws.com
unique-illustrious-amaranthus.glitch.me |
ASN208722 (GLOBAL_DC, FI)
neveragainreal.website.yandexcloud.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
yandexcloud.net
neveragainreal.website.yandexcloud.net |
211 KB |
1 |
glitch.me
unique-illustrious-amaranthus.glitch.me |
64 KB |
25 | 2 |
Domain | Requested by | |
---|---|---|
18 | neveragainreal.website.yandexcloud.net |
unique-illustrious-amaranthus.glitch.me
neveragainreal.website.yandexcloud.net |
1 | unique-illustrious-amaranthus.glitch.me | |
25 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2022-02-01 - 2023-03-02 |
a year | crt.sh |
*.s3.ua.yandexcloud.net GlobalSign RSA OV SSL CA 2018 |
2022-03-04 - 2023-04-05 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://unique-illustrious-amaranthus.glitch.me/sebotito.HTM?/NATWESTB.ANKCRE.CARD/info.htm
Frame ID: A31958FE77121B55CF5E1D9C25EC39DC
Requests: 25 HTTP requests in this frame
Screenshot
Page Title
Log in to Online BankingDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
sebotito.HTM
unique-illustrious-amaranthus.glitch.me/ |
63 KB 64 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
master.css
neveragainreal.website.yandexcloud.net/ |
223 KB 54 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
master_mobile.css
neveragainreal.website.yandexcloud.net/ |
47 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
npc.css
neveragainreal.website.yandexcloud.net/ |
46 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overlayPromptMaster.css
neveragainreal.website.yandexcloud.net/ |
1 KB 743 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overlayPrompt.css
neveragainreal.website.yandexcloud.net/ |
76 B 253 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
neveragainreal.website.yandexcloud.net/ |
21 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
panel-defaults.css
neveragainreal.website.yandexcloud.net/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
neveragainreal.website.yandexcloud.net/ |
2 KB 815 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.2.3.js
neveragainreal.website.yandexcloud.net/ |
253 KB 92 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
n-w-logo.svg
neveragainreal.website.yandexcloud.net/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
plogo.png
neveragainreal.website.yandexcloud.net/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
error-marker.png
neveragainreal.website.yandexcloud.net/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
white-lock.png
neveragainreal.website.yandexcloud.net/ |
285 B 457 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
li5_outer_frame_top_curve.gif
neveragainreal.website.yandexcloud.net/ |
17 KB 17 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
radio-selected.png
neveragainreal.website.yandexcloud.net/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
RNHouseSansW05-Regular.woff2
neveragainreal.website.yandexcloud.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
RNHouseSansW05-Bold.woff2
neveragainreal.website.yandexcloud.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
check-box.png
neveragainreal.website.yandexcloud.net/ |
157 B 328 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
down-chevron.png
neveragainreal.website.yandexcloud.net/ |
295 B 465 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
combined-shape.png
neveragainreal.website.yandexcloud.net/ |
359 B 531 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
RNHouseSansW05-Regular.woff
neveragainreal.website.yandexcloud.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
RNHouseSansW05-Bold.woff
neveragainreal.website.yandexcloud.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
RNHouseSansW05-Regular.ttf
neveragainreal.website.yandexcloud.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
RNHouseSansW05-Bold.ttf
neveragainreal.website.yandexcloud.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- neveragainreal.website.yandexcloud.net
- URL
- https://neveragainreal.website.yandexcloud.net/RNHouseSansW05-Regular.woff2
- Domain
- neveragainreal.website.yandexcloud.net
- URL
- https://neveragainreal.website.yandexcloud.net/RNHouseSansW05-Bold.woff2
- Domain
- neveragainreal.website.yandexcloud.net
- URL
- https://neveragainreal.website.yandexcloud.net/RNHouseSansW05-Regular.woff
- Domain
- neveragainreal.website.yandexcloud.net
- URL
- https://neveragainreal.website.yandexcloud.net/RNHouseSansW05-Bold.woff
- Domain
- neveragainreal.website.yandexcloud.net
- URL
- https://neveragainreal.website.yandexcloud.net/RNHouseSansW05-Regular.ttf
- Domain
- neveragainreal.website.yandexcloud.net
- URL
- https://neveragainreal.website.yandexcloud.net/RNHouseSansW05-Bold.ttf
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
November 24th 2022, 12:47:30 pm
UTC —
From United Kingdom
Threats:
Phishing
Comment: Generic credentials stealer - Phishing URL.
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: NatWest (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| sd5e95e572 string| k0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
14 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
neveragainreal.website.yandexcloud.net
unique-illustrious-amaranthus.glitch.me
neveragainreal.website.yandexcloud.net
2a02:6b8::1da
52.7.248.205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