thicong.com
Open in
urlscan Pro
123.30.135.239
Malicious Activity!
Public Scan
Submission: On July 14 via automatic, source openphish
Summary
This is the only time thicong.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 123.30.135.239 123.30.135.239 | 45899 (VNPT-AS-V...) (VNPT-AS-VN VNPT Corp) | |
10 | 2 |
ASN45899 (VNPT-AS-VN VNPT Corp, VN)
PTR: sv135d239.static.dc.ngoinhamang.com
thicong.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
thicong.com
thicong.com |
613 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | thicong.com |
thicong.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://thicong.com/wellsfargo/wellsfargo/update.html?request_type=LogLogonHandler&location=us_logon1
Frame ID: 65B2841EE6E5E4C7EEF8643093A5DA01
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
update.html
thicong.com/wellsfargo/wellsfargo/ |
30 KB 31 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mobileec92.css
thicong.com/wellsfargo/wellsfargo/css/ |
78 KB 78 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
desktop-tablet.combinedec92.css
thicong.com/wellsfargo/wellsfargo/css/ |
129 KB 129 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf-logo.gif
thicong.com/wellsfargo/wellsfargo/assets/images/global/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.combinedec92.js
thicong.com/wellsfargo/wellsfargo/javascript/ |
309 KB 309 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
desktop-tablet.combinedec92.js
thicong.com/wellsfargo/wellsfargo/javascript/ |
58 KB 58 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader-sm.gif
thicong.com/wellsfargo/wellsfargo/assets/images/osmp/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
43 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-footer.png
thicong.com/wellsfargo/wellsfargo/assets/images/osmp/ |
563 B 563 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
428 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn-icon-search.png
thicong.com/wellsfargo/wellsfargo/assets/images/osmp/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
926 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
34 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader-sm.gif
thicong.com/assets/images/osmp/ |
349 B 349 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| jQuery11100696739772681205 object| WF object| utag_data0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
thicong.com
123.30.135.239
00ad27c585cb12f51f9087349e4dab2088f70343cfbad5309e204f176969040f
03d86f34db46f2d600926047d935ece5636899bd46cb9ad04d526d11ebd28308
0d4c1faf314c56aa4dcbacb09ef48ca4a69c18501c14092e6e9dddd7382da1cf
1e85ec81b9800b4c443d39caca0d0926089a3ac201120db1ceb45b93789480b8
2dfe28cbdb83f01c940de6a88ab86200154fd772d568035ac568664e52068363
41f65e2f54a0cdf9aae7a8504590ef6acb2c16ad62f441355d44be2f5ae2f803
5f3e1ba177c652254f4b10a121d6890c52deab722a9c4adc9e7929416ff3a922
6285d70d7c0cd572b0b82d02fc1fd316f89e982973f267002c3e8de2b5064641
81aac32d4a7ff60babc93d38baaab739c55773843757258afbae01e23288c6cc
9e4d152536a44a33931cdb8b08a6f085aa55632959eb4912ac22d78545969a27
bf09007ac554fd6a0e119113238ff10e8c560842c5f53ad031fa6a4859e11542
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e5e35268c6ace67d34dcb88594fa3fc43ed095b9f1a7560de8967a2039f39fc4
edc5ee3b590dae17b0eb19063c34680c15ee144d13583d006e6a7976b69cd2db