www.chalcoficiall-verify.click
Open in
urlscan Pro
54.242.199.55
Malicious Activity!
Public Scan
Submission: On September 30 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on September 30th 2023. Valid for: 3 months.
This is the only time www.chalcoficiall-verify.click was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de la Nacion Argentina (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 54.242.199.55 54.242.199.55 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2606:4700::68... 2606:4700::6812:1734 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 45.233.70.44 45.233.70.44 | 22798 (RED LINK ...) (RED LINK S.A.) | |
4 | 2606:4700:e2:... 2606:4700:e2::ac40:8309 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-242-199-55.compute-1.amazonaws.com
www.chalcoficiall-verify.click |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
chalcoficiall-verify.click
www.chalcoficiall-verify.click |
903 KB |
5 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 3436 ka-f.fontawesome.com — Cisco Umbrella Rank: 7091 |
34 KB |
1 |
redlink.com.ar
hb.redlink.com.ar |
10 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
7 | www.chalcoficiall-verify.click |
www.chalcoficiall-verify.click
|
4 | ka-f.fontawesome.com |
kit.fontawesome.com
|
1 | hb.redlink.com.ar |
www.chalcoficiall-verify.click
|
1 | kit.fontawesome.com |
www.chalcoficiall-verify.click
|
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
chalcoficiall-verify.click R3 |
2023-09-30 - 2023-12-29 |
3 months | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-11-22 - 2023-12-23 |
a year | crt.sh |
hb.redlink.com.ar DigiCert EV RSA CA G2 |
2023-06-21 - 2024-07-02 |
a year | crt.sh |
ka-f.fontawesome.com GTS CA 1P5 |
2023-09-10 - 2023-12-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.chalcoficiall-verify.click/
Frame ID: 06AAF5152D17F0E32ABAD5CD239BFB07
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Banco del chacoDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.chalcoficiall-verify.click/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1a5e2ebb67.js
kit.fontawesome.com/ |
11 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.chalcoficiall-verify.click/ |
3 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.chalcoficiall-verify.click/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
preg_circle.gif
www.chalcoficiall-verify.click/img/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_link.jpg
www.chalcoficiall-verify.click/img/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CURS-3.0.png
www.chalcoficiall-verify.click/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0311.svg
hb.redlink.com.ar/m/images/logos/ |
49 KB 10 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
ka-f.fontawesome.com/releases/v6.4.2/css/ |
100 KB 23 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v6.4.2/css/ |
27 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v5-font-face.min.css
ka-f.fontawesome.com/releases/v6.4.2/css/ |
823 B 720 B |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-font-face.min.css
ka-f.fontawesome.com/releases/v6.4.2/css/ |
2 KB 1 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_login.jpg
www.chalcoficiall-verify.click/img/ |
879 KB 879 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de la Nacion Argentina (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| FontAwesomeKitConfig0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hb.redlink.com.ar
ka-f.fontawesome.com
kit.fontawesome.com
www.chalcoficiall-verify.click
2606:4700::6812:1734
2606:4700:e2::ac40:8309
45.233.70.44
54.242.199.55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