modulo-applicazione.com
Open in
urlscan Pro
2606:4700:3037::6815:3d06
Malicious Activity!
Public Scan
Effective URL: https://modulo-applicazione.com/ZDNhNDE0OWVjMmI3MTQyYzcwYzFmZDgyMDI2NDEwZWY/download.php
Submission: On March 08 via api from EE — Scanned from IT
Summary
TLS certificate: Issued by E1 on March 7th 2024. Valid for: 3 months.
This is the only time modulo-applicazione.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNP Paribas (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 3 | 2606:4700:303... 2606:4700:3037::6815:3d06 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
modulo-applicazione.com
2 redirects
modulo-applicazione.com |
588 KB |
2 | 1 |
Domain | Requested by | |
---|---|---|
3 | modulo-applicazione.com |
2 redirects
modulo-applicazione.com
|
2 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
modulo-applicazione.com E1 |
2024-03-07 - 2024-06-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://modulo-applicazione.com/ZDNhNDE0OWVjMmI3MTQyYzcwYzFmZDgyMDI2NDEwZWY/download.php
Frame ID: A2231A1A5526C229FB845614DFF9B78B
Requests: 24 HTTP requests in this frame
Screenshot
Page Title
BNL - App su Google PlayPage URL History Show full URLs
-
https://modulo-applicazione.com/
HTTP 302
https://modulo-applicazione.com/ZDNhNDE0OWVjMmI3MTQyYzcwYzFmZDgyMDI2NDEwZWY/index.php?id=f6b533dfc962c1cf4cc... HTTP 302
https://modulo-applicazione.com/ZDNhNDE0OWVjMmI3MTQyYzcwYzFmZDgyMDI2NDEwZWY/download.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://modulo-applicazione.com/
HTTP 302
https://modulo-applicazione.com/ZDNhNDE0OWVjMmI3MTQyYzcwYzFmZDgyMDI2NDEwZWY/index.php?id=f6b533dfc962c1cf4cc82e39794e87f9f6b533dfc962c1cf4cc82e39794e87f9&act=f6b533dfc962c1cf4cc82e39794e87f9f6b533dfc962c1cf4cc82e39794e87f9 HTTP 302
https://modulo-applicazione.com/ZDNhNDE0OWVjMmI3MTQyYzcwYzFmZDgyMDI2NDEwZWY/download.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
download.php
modulo-applicazione.com/ZDNhNDE0OWVjMmI3MTQyYzcwYzFmZDgyMDI2NDEwZWY/ Redirect Chain
|
931 KB 587 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
645 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
404 B 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
244 B 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
332 B 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
266 B 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
240 B 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
email-decode.min.js
modulo-applicazione.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
33 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
227 KB 227 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
159 KB 159 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 2 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
596 B 596 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
610 B 610 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
672 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- modulo-applicazione.com
- URL
- https://modulo-applicazione.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNP Paribas (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 01 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
modulo-applicazione.com/ | Name: PHPSESSID Value: 8pmcv593ji40alrc3fcekup36f |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
modulo-applicazione.com
modulo-applicazione.com
2606:4700:3037::6815:3d06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