vvellfargo.serveftp.com/
3.145.208.97301 Moved Permanently 240 B IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash 1fa5312a3e54419e442e452d4238622a
a4fd8929e331f72c4ab6b18e62215b087300c9ad
f1b44add895c327fad06d555faf6ffd3e93615d2b02baaa9eb03023b4a3d44e7
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET / HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Upgrade-Insecure-Requests: 1
HTTP/1.1 301 Moved Permanently
Date: Sat, 08 Oct 2022 08:36:03 GMT
Server: Apache
Location: https://vvellfargo.serveftp.com/
Content-Length: 240
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
r3.o.lencr.org/
23.36.77.32200 OK 503 B IP 23.36.77.32:0
ASN #20940 Akamai International B.V.
Hash cf768e41672570b0a4a9fe86045915fc
2249064a86b2ba11e28208b9fba1c9f1db4f3e9e
a049499f78078df12f4d1c5180f1f36715a5c99db4f31c18ee06bcf0b6382b30
POST / HTTP/1.1
Host: r3.o.lencr.org
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/ocsp-request
Content-Length: 85
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Content-Type: application/ocsp-response
Content-Length: 503
ETag: "A049499F78078DF12F4D1C5180F1F36715A5C99DB4F31C18EE06BCF0B6382B30"
Last-Modified: Fri, 07 Oct 2022 21:00:00 UTC
Cache-Control: public, no-transform, must-revalidate, max-age=16838
Expires: Sat, 08 Oct 2022 13:16:41 GMT
Date: Sat, 08 Oct 2022 08:36:03 GMT
Connection: keep-alive
firefox.settings.services.mozilla.com/v1/
54.230.111.7200 OK 939 B URL HTTP/1.1 firefox.settings.services.mozilla.com/v1/
IP 54.230.111.7:0
File type JSON data\012- , ASCII text, with very long lines (939), with no line terminators
Hash 2d12f67fe57a87e7366b662d153a5582
d7b02d81cc74f24a251d9363e0f4b0a149264ec1
73c273c0b5a2de3cb970b8e8c187999d3b55e760dc7766dab4bb76428d19b551
GET /v1/ HTTP/1.1
Host: firefox.settings.services.mozilla.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/1.1 200 OK
Content-Type: application/json
Content-Length: 939
Connection: keep-alive
Access-Control-Allow-Origin: *
Access-Control-Expose-Headers: Content-Length, Backoff, Content-Type, Retry-After, Alert
Cache-Control: max-age=259200
Content-Security-Policy: default-src 'none'; frame-ancestors 'none'; base-uri 'none';
Date: Wed, 05 Oct 2022 15:47:18 GMT
X-Content-Type-Options: nosniff
X-Cache: Hit from cloudfront
Via: 1.1 f46773a8236e136c4f6648dd79a7af8e.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: OSL50-P1
X-Amz-Cf-Id: YTdKFBg1WMoFbNHWPWjEXuCVMy4RsW5JIiVWrVxVdZp1tWUIEU1sdA==
Age: 233325
r3.o.lencr.org/
23.36.77.32200 OK 503 B IP 23.36.77.32:0
ASN #20940 Akamai International B.V.
Hash 94a09d62ab3057cda67a091c8d7478f5
b1c9d223a951d0bc9f17c9f3b84501266a552b58
582364f9f6014520c269f1f794e7c34027bd2697b53e5d02fad43e74a735e471
POST / HTTP/1.1
Host: r3.o.lencr.org
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/ocsp-request
Content-Length: 85
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Content-Type: application/ocsp-response
Content-Length: 503
ETag: "582364F9F6014520C269F1F794E7C34027BD2697B53E5D02FAD43E74A735E471"
Last-Modified: Thu, 06 Oct 2022 12:00:00 UTC
Cache-Control: public, no-transform, must-revalidate, max-age=4780
Expires: Sat, 08 Oct 2022 09:55:43 GMT
Date: Sat, 08 Oct 2022 08:36:03 GMT
Connection: keep-alive
content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-2022-11-19-18-50-54.chain
34.160.144.191200 OK 5.3 kB URL HTTP/2 content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-2022-11-19-18-50-54.chain
IP 34.160.144.191:0
File type PEM certificate\012- , ASCII text
Hash 67d5a988edcda47bc3b3b3f65d32b4b6
d4f0e0da8b3690cc7da925026d3414b68c7d954f
55e4848e3ec682e808ce7ee70950f86179c43af4f81926d826a95edfda395a78
GET /chains/remote-settings.content-signature.mozilla.org-2022-11-19-18-50-54.chain HTTP/1.1
Host: content-signature-2.cdn.mozilla.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
x-amz-id-2: 1d6W/4v2Cy/uV8Xcwg86wcCo/zOozEHJOPjJ/j4GMbDP8UTQXQvOY0u5OxO2zFXy7zAqiSnj3rM=
x-amz-request-id: 6M0XYR06WME4WR9N
content-disposition: attachment
accept-ranges: bytes
server: AmazonS3
content-length: 5348
via: 1.1 google
date: Sat, 08 Oct 2022 07:59:31 GMT
age: 2192
last-modified: Fri, 30 Sep 2022 18:50:55 GMT
etag: "67d5a988edcda47bc3b3b3f65d32b4b6"
content-type: binary/octet-stream
cache-control: public,max-age=3600
alt-svc: clear
X-Firefox-Spdy: h2
contile.services.mozilla.com/v1/tiles
34.117.237.239200 OK 12 B URL HTTP/2 contile.services.mozilla.com/v1/tiles
IP 34.117.237.239:0
File type JSON data\012- , ASCII text, with no line terminators
Hash 23e88fb7b99543fb33315b29b1fad9d6
a48926c4ec03c7c8a4e8dffcd31e5a6cdda417ce
7d8f1de8b7de7bc21dfb546a1d0c51bf31f16eee5fad49dbceae1e76da38e5c3
GET /v1/tiles HTTP/1.1
Host: contile.services.mozilla.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: nginx
date: Sat, 08 Oct 2022 08:36:03 GMT
content-type: application/json
content-length: 12
strict-transport-security: max-age=31536000
via: 1.1 google
alt-svc: clear
X-Firefox-Spdy: h2
firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/cfr-v1-en-US
54.230.111.7200 OK 329 B URL HTTP/1.1 firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/cfr-v1-en-US
IP 54.230.111.7:0
File type JSON data\012- , ASCII text, with very long lines (329), with no line terminators
Hash 0333b0655111aa68de771adfcc4db243
63f295a144ac87a7c8e23417626724eeca68a7eb
60636eb1dc67c9ed000fe0b49f03777ad6f549cb1d2b9ff010cf198465ae6300
GET /v1/buckets/main/collections/ms-language-packs/records/cfr-v1-en-US HTTP/1.1
Host: firefox.settings.services.mozilla.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/json
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/json
Connection: keep-alive
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/1.1 200 OK
Content-Type: application/json
Content-Length: 329
Connection: keep-alive
Access-Control-Allow-Origin: *
Access-Control-Expose-Headers: Alert, Content-Type, Expires, Backoff, ETag, Last-Modified, Pragma, Cache-Control, Content-Length, Retry-After
Content-Security-Policy: default-src 'none'; frame-ancestors 'none'; base-uri 'none';
Last-Modified: Fri, 25 Mar 2022 17:45:46 GMT
X-Content-Type-Options: nosniff
Cache-Control: max-age=3600
Date: Sat, 08 Oct 2022 08:29:41 GMT
Expires: Sat, 08 Oct 2022 09:23:04 GMT
ETag: "1648230346554"
X-Cache: Hit from cloudfront
Via: 1.1 09ae414c9d6c5323d5147457ada70ec6.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: OSL50-P1
X-Amz-Cf-Id: 8zmoluwTZJpJGWsl7kVmL59TNC0vPV3awOLpR7UURfJEd-aW18zPUg==
Age: 382
ocsp.digicert.com/
93.184.220.29200 OK 471 B IP 93.184.220.29:0
Hash d6c404502c7987174a84d8f0a3efab23
fc3a3f6d63acab3f659fb3536b65fd8564ec8628
94b5693df873bd923ffbf31f576fff01d2628e5796af4c6b91306a743e27d19b
POST / HTTP/1.1
Host: ocsp.digicert.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/ocsp-request
Content-Length: 83
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Accept-Ranges: bytes
Age: 4068
Cache-Control: 'max-age=158059'
Content-Type: application/ocsp-response
Date: Sat, 08 Oct 2022 08:36:04 GMT
Last-Modified: Sat, 08 Oct 2022 07:28:16 GMT
Server: ECS (ska/F6FD)
X-Cache: HIT
Content-Length: 471
vvellfargo.serveftp.com/
3.145.208.97200 OK 40 kB IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, Unicode text, UTF-8 text, with very long lines (2224)
Hash 751fae0590e64984c98e0aa72667c47c
951114a31c3ab68e5134e544a7e60eac894cffd5
923b3c7b6112208a375f22712f0e53d448646364a870ca9074b989b1558fe7f6
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET / HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:03 GMT
Server: Apache
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
vvellfargo.serveftp.com/main_files/ga.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/ga.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/ga.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/ytc.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/ytc.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/ytc.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
push.services.mozilla.com/
34.210.107.213101 Switching Protocols 0 B URL HTTP/1.1 push.services.mozilla.com/
IP 34.210.107.213:0
Hash d41d8cd98f00b204e9800998ecf8427e
da39a3ee5e6b4b0d3255bfef95601890afd80709
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
GET / HTTP/1.1
Host: push.services.mozilla.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Sec-WebSocket-Version: 13
Origin: wss://push.services.mozilla.com/
Sec-WebSocket-Protocol: push-notification
Sec-WebSocket-Extensions: permessage-deflate
Sec-WebSocket-Key: NHRwUDD6RhhNnwdnCgEULw==
Connection: keep-alive, Upgrade
Sec-Fetch-Dest: websocket
Sec-Fetch-Mode: websocket
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
Upgrade: websocket
HTTP/1.1 101 Switching Protocols
Connection: Upgrade
Upgrade: websocket
Sec-WebSocket-Accept: xcazxQsZarNKxhL9HWOuXOUQoQE=
vvellfargo.serveftp.com/main_files/ga_conversion_async.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/ga_conversion_async.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/ga_conversion_async.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/gtag.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/gtag.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/gtag.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/gtag.js(1).download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/gtag.js(1).download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/gtag.js(1).download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/gtag.js(2).download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/gtag.js(2).download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/gtag.js(2).download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/gtag.js(3).download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/gtag.js(3).download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/gtag.js(3).download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
ocsp.digicert.com/
93.184.220.29200 OK 471 B IP 93.184.220.29:0
Hash ffeaf716872d7c68a9717e016dff5653
f3a53e4dfa84dc87b9cefe710c456ca4603b98cc
b14510c4ff79f9150d7072dd08fabbd38a98415588eb658eb9a008ca07f4f70d
POST / HTTP/1.1
Host: ocsp.digicert.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/ocsp-request
Content-Length: 83
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Accept-Ranges: bytes
Age: 5793
Cache-Control: 'max-age=158059'
Content-Type: application/ocsp-response
Date: Sat, 08 Oct 2022 08:36:04 GMT
Last-Modified: Sat, 08 Oct 2022 06:59:32 GMT
Server: ECS (ska/F6FD)
X-Cache: HIT
Content-Length: 471
ocsp.digicert.com/
93.184.220.29200 OK 471 B IP 93.184.220.29:0
Hash 734dfae9b2ca4d903c325dc71f4c04fd
2b6128f8f87f108cc153e569bff615ef12085ca4
4152f98271ee326eb65915b1c0fb71b5afc4b9b9fed68ef2812e865638dc7f48
POST / HTTP/1.1
Host: ocsp.digicert.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/ocsp-request
Content-Length: 83
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Accept-Ranges: bytes
Age: 2179
Cache-Control: 'max-age=158059'
Content-Type: application/ocsp-response
Date: Sat, 08 Oct 2022 08:36:04 GMT
Last-Modified: Sat, 08 Oct 2022 07:59:45 GMT
Server: ECS (amb/6B8A)
X-Cache: HIT
Content-Length: 471
vvellfargo.serveftp.com/main_files/adrum-ext.b4436be974de477658d4a93afb752165.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/adrum-ext.b4436be974de477658d4a93afb752165.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/adrum-ext.b4436be974de477658d4a93afb752165.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/general_alt.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/general_alt.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/general_alt.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/main.b3b5f355e18c2c42a801.chunk.css
3.145.208.97200 OK 12 kB URL HTTP/1.1 vvellfargo.serveftp.com/main_files/main.b3b5f355e18c2c42a801.chunk.css
IP 3.145.208.97:0
File type ASCII text, with very long lines (11856), with no line terminators
Hash 89c57e64334b3c479c26cf0dd1971fad
259db957ed72c84154021c09ba48ceaa8c49de7a
5e68ea9ca9cce32f91979f88142e963f0ff950cc1f1b6c3246eaaaf2f3091c58
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
GET /main_files/main.b3b5f355e18c2c42a801.chunk.css HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 09:50:20 GMT
Accept-Ranges: bytes
Content-Length: 11856
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/css
vvellfargo.serveftp.com/main_files/adrum-ext.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/adrum-ext.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/adrum-ext.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.3.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.3.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.3.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/nd
3.145.208.97200 OK 51 kB URL HTTP/1.1 vvellfargo.serveftp.com/main_files/nd
IP 3.145.208.97:0
File type ASCII text, with very long lines (2285)
Hash 346aeba5ca2a1ca2438d2ab74c89ada0
0196fa589db9b93d746ff6e86a3c3c8a7c562f0b
5e256d1bca0a18337b236552eeede0cfc84632413521e51227be9d672826f5cc
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/nd HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 11:48:30 GMT
Accept-Ranges: bytes
Content-Length: 51327
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
vvellfargo.serveftp.com/main_files/utag.4.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.4.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.4.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.5.js.download
3.145.208.97200 OK 6.7 kB URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.5.js.download
IP 3.145.208.97:0
File type ASCII text, with very long lines (2728)
Hash e0af6d96ca8daf62be612151e7eb5821
f2a020844c631fc468434d756fc58661cc613121
0b44ee80e827c63eb7c8d953a67dc158c6154bdb2fea0969175e898600ecc9d2
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.5.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 11:34:38 GMT
Accept-Ranges: bytes
Content-Length: 6749
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: application/javascript
vvellfargo.serveftp.com/main_files/utag.7.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.7.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.7.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.10.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.10.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.10.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.9.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.9.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.9.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.15.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.15.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.15.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/glu.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/glu.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/glu.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/wfui.5d3fa5b6daab852c2a31.chunk.css
3.145.208.97200 OK 101 kB URL HTTP/1.1 vvellfargo.serveftp.com/main_files/wfui.5d3fa5b6daab852c2a31.chunk.css
IP 3.145.208.97:0
File type ASCII text, with very long lines (65536), with no line terminators
Size 101 kB (101087 bytes)
Hash 7eacd065e8320eabb4f66e807ba3b9ce
a0f64e27a7cb68015959154fadde15ab85a08c1d
fea85638d902b7d705d72aa9776531c035371a16774f0e52be50c0638c6eb110
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
GET /main_files/wfui.5d3fa5b6daab852c2a31.chunk.css HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 09:50:20 GMT
Accept-Ranges: bytes
Content-Length: 101087
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/css
vvellfargo.serveftp.com/main_files/mint.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/mint.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/mint.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/pic.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/pic.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/pic.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/detector-dom.min.js.download
3.145.208.97200 OK 341 kB URL HTTP/1.1 vvellfargo.serveftp.com/main_files/detector-dom.min.js.download
IP 3.145.208.97:0
File type ASCII text, with very long lines (65428), with CRLF line terminators
Size 341 kB (340656 bytes)
Hash 19ecb64e1651d039ef9eb9d2ffa0dcc2
946bc940945602710c52d5827c707bd469921878
9a5e8cb8c0d7468337c96ba9de5c90701a038a135975b1f4444bde35cb0eb212
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/detector-dom.min.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 11:34:38 GMT
Accept-Ranges: bytes
Content-Length: 340656
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/javascript
vvellfargo.serveftp.com/main_files/try.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/try.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/try.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/ay6u
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/ay6u
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/ay6u HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/vyHb
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/vyHb
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/vyHb HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/vyHb(1)
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/vyHb(1)
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/vyHb(1) HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/vyHb(2)
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/vyHb(2)
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/vyHb(2) HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/runtime.33b14b045f6fc05b2f4e.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/runtime.33b14b045f6fc05b2f4e.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/runtime.33b14b045f6fc05b2f4e.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/wfui.11759b41ee721f527bba.chunk.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/wfui.11759b41ee721f527bba.chunk.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/wfui.11759b41ee721f527bba.chunk.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/vendor.11ebf7c8e218fb409798.chunk.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/vendor.11ebf7c8e218fb409798.chunk.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/vendor.11ebf7c8e218fb409798.chunk.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/main.2c70436e78e79e8ed3b8.chunk.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/main.2c70436e78e79e8ed3b8.chunk.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/main.2c70436e78e79e8ed3b8.chunk.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=91
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.js.download
3.145.208.97200 OK 36 kB URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.js.download
IP 3.145.208.97:0
File type Unicode text, UTF-8 text, with very long lines (6499)
Hash 50eb0beb90687853a0105e5325a50d19
48c37c9c29ad57dd4f457781a9ddebadf027ec7e
d760e3537667a9d208c2d46f5dbcbd8a1bbb818d868a0d46226b35eac7194558
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 11:34:38 GMT
Accept-Ranges: bytes
Content-Length: 36050
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: application/javascript
vvellfargo.serveftp.com/sweetalert.min.js
3.145.208.97200 OK 41 kB URL HTTP/1.1 vvellfargo.serveftp.com/sweetalert.min.js
IP 3.145.208.97:0
File type ASCII text, with very long lines (40811), with no line terminators
Hash db59920a4083abe0465040f661bfa25f
8a13f24e96c622eb6df66cffc228e9bd538e9225
0b6f493309b84176ea8b636e47430e91925d767955a2dc630d7a37987bbaa8fd
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /sweetalert.min.js HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:04 GMT
Server: Apache
Last-Modified: Tue, 28 Jun 2022 06:50:36 GMT
Accept-Ranges: bytes
Content-Length: 40811
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: application/javascript
vvellfargo.serveftp.com/main_files/login-userprefs.min.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/login-userprefs.min.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/login-userprefs.min.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/atadun.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/atadun.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/atadun.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/ytc.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/ytc.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/ytc.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/gtag.js(3).download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/gtag.js(3).download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/gtag.js(3).download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=90
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/adrum-ext.b4436be974de477658d4a93afb752165.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/adrum-ext.b4436be974de477658d4a93afb752165.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/adrum-ext.b4436be974de477658d4a93afb752165.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/general_alt.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/general_alt.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/general_alt.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/adrum-ext.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/adrum-ext.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/adrum-ext.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/ttms.gif
3.145.208.97200 OK 43 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/ttms.gif
IP 3.145.208.97:0
File type GIF image data, version 89a, 1 x 1\012- data
Hash 325472601571f31e1bf00674c368d335
2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
GET /main_files/ttms.gif HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 09:50:28 GMT
Accept-Ranges: bytes
Content-Length: 43
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: image/gif
vvellfargo.serveftp.com/main_files/utag.3.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.3.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.3.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.4.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.4.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.4.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
connect.secure.wellsfargo.com/auth/login/present?origin=cob&LOB=CONS
159.45.2.156200 9.9 kB URL HTTP/1.1 connect.secure.wellsfargo.com/auth/login/present?origin=cob&LOB=CONS
IP 159.45.2.156:0
ASN #10837 WELLSFARGO-10837
Hash 169c2ad7ceee77822fbe83551433e89c
374fcc252d1d77c586b01a59fc36dcbd24537b98
890cfc55b50da92c4d7cf0858f52130acf4f3877f0d88db3833662f9f7ccef0b
GET /auth/login/present?origin=cob&LOB=CONS HTTP/1.1
Host: connect.secure.wellsfargo.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
HTTP/1.1 200
Date: Sat, 08 Oct 2022 08:36:04 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Expires: -1
Cache-Control: no-cache, no-store, max-age=0
Set-Cookie: ADRUM_BTa=R:32|g:5e1571ed-14bf-4689-9de4-e1960f38dcef; Expires=Sat, 08-Oct-2022 08:36:34 GMT; Path=/; Secure
ADRUM_BTa=R:32|g:5e1571ed-14bf-4689-9de4-e1960f38dcef|n:wellsfargo-prod_43732a1d-9afc-4e95-ad69-f4ac78c780a7; Expires=Sat, 08-Oct-2022 08:36:34 GMT; Path=/; Secure
SameSite=None; Expires=Sat, 08-Oct-2022 08:36:34 GMT; Path=/; Secure
ADRUM_BT1=R:32|i:301156; Expires=Sat, 08-Oct-2022 08:36:34 GMT; Path=/; Secure
ADRUM_BT1=R:32|i:301156|e:7; Expires=Sat, 08-Oct-2022 08:36:34 GMT; Path=/; Secure
wfacookie=45202210080136041915706427; domain=.wellsfargo.com; path=/; expires=5 Oct 2032 08:36:04 GMT; secure=true; HttpOnly
gingerbread_cookie=69B15B5F8B56803B369D50A4A42A8837; Path=/auth; Secure; HttpOnly
AuthCookie=217c8a37-f810-4f09-b8df-ded7f0aefce3; Path=/auth; Secure; HttpOnly
LOGINORIGIN=cob; Domain=wellsfargo.com; Path=/auth; Secure; HttpOnly
AuthCookie=217c8a37-f810-4f09-b8df-ded7f0aefce3; Path=/auth; Secure; HttpOnly
INLANG=EN; Domain=wellsfargo.com; Expires=Sun, 08-Oct-2023 08:36:04 GMT; Path=/; Secure; HttpOnly
ISD_AB_COOKIE=A; Max-Age=7200; path=/; Domain=connect.secure.wellsfargo.com; Secure; httpOnly
ISD_LA_COOKIE=1BUXsj6sr66EzUtMcLUbmPvvwnnaXTDnIRSG47+rapB0VoP8B7GUWnbJbRzSyT0S89WuxJxNZ+ypBgAAAAE=; path=/; domain=connect.secure.wellsfargo.com; HttpOnly; Secure
WesdAksn=A163vLaDAQAA7vElhlw3Pq0oofx-o6MVJhSjhgX1FpTq8T6A0xtiZa8_aaAkAVtaKpqcuC2nwH8AADQwAAAAAA|1|0|cf2e30b99182e5a487c05a6bf126fcc7464ac938; Path=/; Max-Age=1577847600; Domain=wellsfargo.com; Secure
X-XSS-Protection: 1; mode=block
Pragma: no-cache
Content-Security-Policy: default-src 'none'; img-src data: 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com https://www.google-analytics.com https://www.facebook.com https://*.doubleclick.net https://*.google.com https://*.innovid.com https://*.youtube.com https://pdx-col.eum-appdynamics.com; font-src data: 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com; script-src 'nonce-990f6256-13b9-43ed-8d8c-7f5853acd29f' 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com s.yimg.com sp.analytics.yahoo.com; style-src 'unsafe-inline' 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com; connect-src 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com https://chatrouter-wellsfargo-test.nod-glb.nuance.com https://api.rlcdn.com https://s.yimg.com https://www.google-analytics.com https://*.doubleclick.net https://pdx-col.eum-appdynamics.com; frame-src 'self' https://*.wellsfargo.com https://*.doubleclick.net https://*.google.com https://awusw-wfr.advanced-web-analytics.com; form-action 'self' https://*.wellsfargo.com https://wellsfargo.com https://*.docusign.net https://*.docusign.com; media-src 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com; plugin-types 'none'; report-uri https://ort.wellsfargo.com/reporting/csp
Strict-Transport-Security: max-age=31536000
Content-Language: en-US
Server: KONICHIWA/1.1
X-UA-Compatible: IE=edge
X-Frame-Options: DENY
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Content-Encoding: gzip
vvellfargo.serveftp.com/main_files/utag.7.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.7.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.7.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=89
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.9.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.9.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.9.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/utag.15.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/utag.15.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/utag.15.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/glu.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/glu.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/glu.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=91
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/mint.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/mint.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/mint.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=90
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/pic.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/pic.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/pic.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=88
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
r3.o.lencr.org/
23.36.77.32200 OK 503 B IP 23.36.77.32:0
ASN #20940 Akamai International B.V.
Hash 31e440ccd993c4ee793f50511c2ac7c4
4380327d50b7001d158aee05a57c6078e57c94e4
65d8a97f6df1e110333a01d1f6dcb4982db7bb4b1c5f3f1498fafa716e250c0f
POST / HTTP/1.1
Host: r3.o.lencr.org
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/ocsp-request
Content-Length: 85
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Content-Type: application/ocsp-response
Content-Length: 503
ETag: "65D8A97F6DF1E110333A01D1F6DCB4982DB7BB4B1C5F3F1498FAFA716E250C0F"
Last-Modified: Thu, 06 Oct 2022 12:00:00 UTC
Cache-Control: public, no-transform, must-revalidate, max-age=2551
Expires: Sat, 08 Oct 2022 09:18:36 GMT
Date: Sat, 08 Oct 2022 08:36:05 GMT
Connection: keep-alive
vvellfargo.serveftp.com/main_files/COB-BOB-IRT-enroll_park.jpg
3.145.208.97200 OK 659 kB URL HTTP/1.1 vvellfargo.serveftp.com/main_files/COB-BOB-IRT-enroll_park.jpg
IP 3.145.208.97:0
File type JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=1, copyright=\302\251 Jim Purdum], progressive, precision 8, 2400x1600, components 3\012- data
Size 659 kB (659319 bytes)
Hash 133068d7ee306f24743190a69b433d39
ddc86ce7958b001acdcd32ff8ee65a9e444a2204
0ec17c78a8c0de92bd385f344308a3e0c715fedbb9b784820bd7aefcfc69c214
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
GET /main_files/COB-BOB-IRT-enroll_park.jpg HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 09:50:26 GMT
Accept-Ranges: bytes
Content-Length: 659319
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: image/jpeg
vvellfargo.serveftp.com/main_files/trx.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/trx.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/trx.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
r3.o.lencr.org/
23.36.77.32200 OK 503 B IP 23.36.77.32:0
ASN #20940 Akamai International B.V.
Hash 31e440ccd993c4ee793f50511c2ac7c4
4380327d50b7001d158aee05a57c6078e57c94e4
65d8a97f6df1e110333a01d1f6dcb4982db7bb4b1c5f3f1498fafa716e250c0f
POST / HTTP/1.1
Host: r3.o.lencr.org
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/ocsp-request
Content-Length: 85
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Content-Type: application/ocsp-response
Content-Length: 503
ETag: "65D8A97F6DF1E110333A01D1F6DCB4982DB7BB4B1C5F3F1498FAFA716E250C0F"
Last-Modified: Thu, 06 Oct 2022 12:00:00 UTC
Cache-Control: public, no-transform, must-revalidate, max-age=2551
Expires: Sat, 08 Oct 2022 09:18:36 GMT
Date: Sat, 08 Oct 2022 08:36:05 GMT
Connection: keep-alive
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fd0135ba0-9033-445f-8155-a6c093862ccb.jpeg
34.120.237.76200 OK 9.0 kB URL HTTP/2 img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fd0135ba0-9033-445f-8155-a6c093862ccb.jpeg
IP 34.120.237.76:0
File type JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 296x148, components 3\012- data
Hash 7e30ca5022768294665070cafc9d489c
c6ebf53c21206cfcf8e70279d3ae43f0170ade3a
6b834cdae692318a114c0d82ebff4fa8f4e65526983758e08ffb130d4d86020f
GET /296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fd0135ba0-9033-445f-8155-a6c093862ccb.jpeg HTTP/1.1
Host: img-getpocket.cdn.mozilla.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: null
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: nginx
content-length: 9046
x-amzn-requestid: d560c8ba-6e81-46f7-a451-30c40fbfce6f
x-xss-protection: 1; mode=block
access-control-allow-origin: *
strict-transport-security: max-age=63072000; includeSubdomains; preload
x-frame-options: DENY
content-security-policy: default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self'; object-src 'none'
x-amz-apigw-id: Zmhi_F7qIAMFkQg=
x-content-type-options: nosniff
x-amzn-trace-id: Root=1-633f4946-012e65d675558ec8544a1f30;Sampled=0
x-amzn-remapped-date: Thu, 06 Oct 2022 21:31:50 GMT
x-amz-cf-pop: SEA73-P2
x-cache: Hit from cloudfront
x-amz-cf-id: Y_VpleudG3M2sQd7mFGVhPvfULiNQl3YY8xuhiTnTE5VIC64O8vqMA==
via: 1.1 e291f351a18746d40754b367095a2872.cloudfront.net (CloudFront), 1.1 583992e175976bd59a21b4416890271e.cloudfront.net (CloudFront), 1.1 google
date: Fri, 07 Oct 2022 21:44:19 GMT
age: 39106
etag: "c6ebf53c21206cfcf8e70279d3ae43f0170ade3a"
content-type: image/jpeg
cache-control: max-age=3600,public,public
alt-svc: clear
X-Firefox-Spdy: h2
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fa57a0ead-deef-46c2-985b-fb7ba539285b.jpeg
34.120.237.76200 OK 6.4 kB URL HTTP/2 img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fa57a0ead-deef-46c2-985b-fb7ba539285b.jpeg
IP 34.120.237.76:0
File type JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 296x148, components 3\012- data
Hash 9bc50d1380ae8fc980ae1cc38f2371c7
be79aecfd7eefa89c409ed743402a292ff0ce6c0
43e015802ba453d4cd79984b53efa8a529ece62760f6693f9daeb2388179201f
GET /296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fa57a0ead-deef-46c2-985b-fb7ba539285b.jpeg HTTP/1.1
Host: img-getpocket.cdn.mozilla.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: null
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: nginx
content-length: 6366
x-amzn-requestid: ddcd915d-2606-4243-969e-19fb02b5b6d1
x-xss-protection: 1; mode=block
access-control-allow-origin: *
strict-transport-security: max-age=63072000; includeSubdomains; preload
x-frame-options: DENY
content-security-policy: default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self'; object-src 'none'
x-amz-apigw-id: Zp1EJGoSIAMFcSw=
x-content-type-options: nosniff
x-amzn-trace-id: Root=1-63409bb3-1c7bd17a2dcdd25e4da6d346;Sampled=0
x-amzn-remapped-date: Fri, 07 Oct 2022 21:35:47 GMT
x-amz-cf-pop: HIO50-C1, SEA19-C2
x-cache: Miss from cloudfront
x-amz-cf-id: Cm4uaStVKEsemoOHrc04J9qNysQJoMB7-R8LEzmlRXt47mpXi2NRPA==
via: 1.1 4dde8ec6d6c12741888c2d3a059d4a2e.cloudfront.net (CloudFront), 1.1 9046e5a276a05e60ee34c8475e92b8e6.cloudfront.net (CloudFront), 1.1 google
date: Fri, 07 Oct 2022 21:50:12 GMT
age: 38753
etag: "be79aecfd7eefa89c409ed743402a292ff0ce6c0"
content-type: image/jpeg
cache-control: max-age=3600,public,public
alt-svc: clear
X-Firefox-Spdy: h2
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F70128380-51a1-430f-bca1-5212a3dd8807.jpeg
34.120.237.76200 OK 12 kB URL HTTP/2 img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F70128380-51a1-430f-bca1-5212a3dd8807.jpeg
IP 34.120.237.76:0
File type JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 296x148, components 3\012- data
Hash 1c712a8d12119cdef4376b6055f3493c
e040dc81a71c6a94dc600ecb61bf0c8f1a086e85
6a2c6384e05dae0013a2890ad63c91af7d2f04a0d706ce496f44defc7b209fa7
GET /296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F70128380-51a1-430f-bca1-5212a3dd8807.jpeg HTTP/1.1
Host: img-getpocket.cdn.mozilla.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: null
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: nginx
content-length: 11618
x-amzn-requestid: 5a8e397a-41df-41a1-a71e-25cedc35b063
x-xss-protection: 1; mode=block
access-control-allow-origin: *
strict-transport-security: max-age=63072000; includeSubdomains; preload
x-frame-options: DENY
content-security-policy: default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self'; object-src 'none'
x-amz-apigw-id: Zp1R5H9aoAMFyew=
x-content-type-options: nosniff
x-amzn-trace-id: Root=1-63409c0b-3286ff464612a56158b81f4e;Sampled=0
x-amzn-remapped-date: Fri, 07 Oct 2022 21:37:15 GMT
x-amz-cf-pop: HIO50-C1, SEA19-C2
x-cache: Miss from cloudfront
x-amz-cf-id: dpzW4--jwWxQ7cD4rKIZuX4pr9LQI0CivP6grcpduuNMPoKyQwSecg==
via: 1.1 5ab5dc09da67e3ea794ec8a82992cc88.cloudfront.net (CloudFront), 1.1 e66162aafd55b64ba1478ff7105150fa.cloudfront.net (CloudFront), 1.1 google
date: Fri, 07 Oct 2022 21:37:16 GMT
etag: "e040dc81a71c6a94dc600ecb61bf0c8f1a086e85"
content-type: image/jpeg
age: 39529
cache-control: max-age=3600,public,public
alt-svc: clear
X-Firefox-Spdy: h2
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fcff4d93b-bc27-41dd-ad6a-5d295cfb6472.jpeg
34.120.237.76200 OK 4.3 kB URL HTTP/2 img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fcff4d93b-bc27-41dd-ad6a-5d295cfb6472.jpeg
IP 34.120.237.76:0
File type JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 296x148, components 3\012- data
Hash 7dcf23b32642f7a82a0a7d734a631bca
9dc8bd1a00dcb896fade6d3112ef53439ecb8fe7
add9aab4427819610f8d693758a752910cf314346e974b7636a82381ab9daa4d
GET /296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fcff4d93b-bc27-41dd-ad6a-5d295cfb6472.jpeg HTTP/1.1
Host: img-getpocket.cdn.mozilla.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: null
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: nginx
content-length: 4252
x-amzn-requestid: 8d6a225c-6389-4f20-9b90-494841f47c99
x-xss-protection: 1; mode=block
access-control-allow-origin: *
strict-transport-security: max-age=63072000; includeSubdomains; preload
x-frame-options: DENY
content-security-policy: default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self'; object-src 'none'
x-amz-apigw-id: Zp1R4GjCIAMFX-Q=
x-content-type-options: nosniff
x-amzn-trace-id: Root=1-63409c0b-4076dc933185d9fd6b68e802;Sampled=0
x-amzn-remapped-date: Fri, 07 Oct 2022 21:37:15 GMT
x-amz-cf-pop: SEA73-P2, SEA73-P1
x-cache: Miss from cloudfront
x-amz-cf-id: Wb1JAlWtR9sSEi_KuYZivvMivSxZjo92LGpWgFppol5zgapK6eQ-dg==
via: 1.1 c21a0d27ceec21e266c9f962d0349438.cloudfront.net (CloudFront), 1.1 6396e88c437c096ef98930ce29f731a2.cloudfront.net (CloudFront), 1.1 google
date: Fri, 07 Oct 2022 21:37:16 GMT
etag: "9dc8bd1a00dcb896fade6d3112ef53439ecb8fe7"
content-type: image/jpeg
age: 39529
cache-control: max-age=3600,public,public
alt-svc: clear
X-Firefox-Spdy: h2
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fa96a8500-2a22-4035-9ef1-326d1694aabe.jpeg
34.120.237.76200 OK 8.6 kB URL HTTP/2 img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fa96a8500-2a22-4035-9ef1-326d1694aabe.jpeg
IP 34.120.237.76:0
File type JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 296x148, components 3\012- data
Hash 15ba06e4cfdbb4480ad9d3d07a70f7d1
54050ea4062695b87d04d69f455b957bc93c9be6
9ee148a18daffcd7e3892ee7818886b7ee8763272c97b627d368d1dc995836bd
GET /296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fa96a8500-2a22-4035-9ef1-326d1694aabe.jpeg HTTP/1.1
Host: img-getpocket.cdn.mozilla.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: null
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: nginx
content-length: 8628
x-amzn-requestid: 858952a7-50aa-4942-a58a-6b1a8ead66cb
x-xss-protection: 1; mode=block
access-control-allow-origin: *
strict-transport-security: max-age=63072000; includeSubdomains; preload
x-frame-options: DENY
content-security-policy: default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self'; object-src 'none'
x-amz-apigw-id: Zp2BeG45oAMF0yg=
x-content-type-options: nosniff
x-amzn-trace-id: Root=1-63409d3c-6e26167b1944a0e518b0686e;Sampled=0
x-amzn-remapped-date: Fri, 07 Oct 2022 21:42:20 GMT
x-amz-cf-pop: HIO50-C1, SEA19-C2
x-cache: Hit from cloudfront
x-amz-cf-id: olEe_ETm0OBokLbkhr2a5invlm5stvDH86HZKIIDNuytlH7bgr_SpQ==
via: 1.1 4f87745990545c1ac0195c157e1668f8.cloudfront.net (CloudFront), 1.1 324a68a6c25ee50d774953f3e15a611c.cloudfront.net (CloudFront), 1.1 google
date: Fri, 07 Oct 2022 22:11:34 GMT
age: 37471
etag: "54050ea4062695b87d04d69f455b957bc93c9be6"
content-type: image/jpeg
cache-control: max-age=3600,public,public
alt-svc: clear
X-Firefox-Spdy: h2
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F56d7dd70-3706-4d51-94da-88fa19a58ad8.jpeg
34.120.237.76200 OK 5.2 kB URL HTTP/2 img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F56d7dd70-3706-4d51-94da-88fa19a58ad8.jpeg
IP 34.120.237.76:0
File type JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 296x148, components 3\012- data
Hash e5c4757ceb6dce32d0f9d26d5b3df038
d8209d82f61c7a09e00756e5dd32c99bc61af4a8
6aa007279ba4cdea3f772e0601e4082d40ee947ef8cc1201ce0009fb42ca9885
GET /296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F56d7dd70-3706-4d51-94da-88fa19a58ad8.jpeg HTTP/1.1
Host: img-getpocket.cdn.mozilla.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: null
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: nginx
content-length: 5185
x-amzn-requestid: 3c3ff89f-8a8c-44ae-981a-0e9adaf7d959
x-xss-protection: 1; mode=block
access-control-allow-origin: *
strict-transport-security: max-age=63072000; includeSubdomains; preload
x-frame-options: DENY
content-security-policy: default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self'; object-src 'none'
x-amz-apigw-id: Zj_dSEs8IAMFqFA=
x-content-type-options: nosniff
x-amzn-trace-id: Root=1-633e45ee-6c97b82d137c2f1951270b82;Sampled=0
x-amzn-remapped-date: Thu, 06 Oct 2022 03:05:18 GMT
x-amz-cf-pop: SEA19-C2
x-cache: Hit from cloudfront
x-amz-cf-id: 6wWlD3C6HI9oxa0VAYA6N5afAcUDTQXdO8X31eZUglfdC6jSQo_gew==
via: 1.1 8dbfaf7df256a75768461d934659b6b2.cloudfront.net (CloudFront), 1.1 476c2ba6d9f6cd69dbcedbd65688cbc0.cloudfront.net (CloudFront), 1.1 google
date: Sat, 08 Oct 2022 03:29:14 GMT
age: 18411
etag: "d8209d82f61c7a09e00756e5dd32c99bc61af4a8"
content-type: image/jpeg
cache-control: max-age=3600,public,public
alt-svc: clear
X-Firefox-Spdy: h2
vvellfargo.serveftp.com/main_files/try.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/try.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/try.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
www15.wellsfargomedia.com/wfui/css/fonts/wellsfargosans-sbd.woff2
96.6.19.156200 OK 23 kB URL HTTP/2 www15.wellsfargomedia.com/wfui/css/fonts/wellsfargosans-sbd.woff2
IP 96.6.19.156:0
File type Web Open Font Format (Version 2), TrueType, length 22600, version 1.13107\012- data
Hash 83df8749c013f13019fa8e0912041759
2bbffcf012a59e47661c0a37edda0fc772992ae7
ab9d8c97b35ed86b6224aca911aa304a0d7dbcbd28e00a4c6585b96e28ed30ba
GET /wfui/css/fonts/wellsfargosans-sbd.woff2 HTTP/1.1
Host: www15.wellsfargomedia.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://vvellfargo.serveftp.com
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: KONICHIWA/2.0
last-modified: Tue, 26 Feb 2019 19:38:34 GMT
etag: "5848-582d133e56280"
accept-ranges: bytes
content-length: 22600
access-control-allow-origin: *
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
strict-transport-security: max-age=31536000; includeSubdomains;
content-type: font/woff2
cache-control: max-age=31536000
expires: Sun, 08 Oct 2023 08:36:05 GMT
date: Sat, 08 Oct 2022 08:36:05 GMT
X-Firefox-Spdy: h2
www15.wellsfargomedia.com/wfui/css/fonts/wellsfargoserif-rg.woff2
96.6.19.156200 OK 27 kB URL HTTP/2 www15.wellsfargomedia.com/wfui/css/fonts/wellsfargoserif-rg.woff2
IP 96.6.19.156:0
File type Web Open Font Format (Version 2), TrueType, length 26708, version 1.13107\012- data
Hash 885d42ab7ffcffc42ed29816c3ce9727
3d84cb41ddfb5bf8627e2b9dc867237bea47baad
aeb7b3bfc4281d35b02dfde05ac7a6c0d3daa7f3123b35a9cbd4b5a8e3f3c310
GET /wfui/css/fonts/wellsfargoserif-rg.woff2 HTTP/1.1
Host: www15.wellsfargomedia.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://vvellfargo.serveftp.com
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: KONICHIWA/2.0
last-modified: Mon, 11 Mar 2019 20:52:01 GMT
etag: "6854-583d7be82be40"
accept-ranges: bytes
content-length: 26708
access-control-allow-origin: *
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
strict-transport-security: max-age=31536000; includeSubdomains;
content-type: font/woff2
cache-control: max-age=31536000
expires: Sun, 08 Oct 2023 08:36:05 GMT
date: Sat, 08 Oct 2022 08:36:05 GMT
X-Firefox-Spdy: h2
www15.wellsfargomedia.com/wfui/css/fonts/wellsfargosans-rg.woff2
96.6.19.156200 OK 22 kB URL HTTP/2 www15.wellsfargomedia.com/wfui/css/fonts/wellsfargosans-rg.woff2
IP 96.6.19.156:0
File type Web Open Font Format (Version 2), TrueType, length 22424, version 1.13107\012- data
Hash 0a1639ebe9fab396657a62aa5233c832
9b58164729ad918dd7255e4856f9da7f3a90bfde
631f3b6267a831a8d67c45e480b5d5a2601f10ff8708bcf3a45a41b377a129cc
GET /wfui/css/fonts/wellsfargosans-rg.woff2 HTTP/1.1
Host: www15.wellsfargomedia.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://vvellfargo.serveftp.com
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/2 200 OK
server: KONICHIWA/2.0
last-modified: Tue, 26 Feb 2019 19:38:34 GMT
etag: "5798-582d133e56280"
accept-ranges: bytes
content-length: 22424
access-control-allow-origin: *
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
strict-transport-security: max-age=31536000; includeSubdomains;
content-type: font/woff2
cache-control: max-age=31536000
expires: Sun, 08 Oct 2023 08:36:05 GMT
date: Sat, 08 Oct 2022 08:36:05 GMT
X-Firefox-Spdy: h2
vvellfargo.serveftp.com/main_files/vyHb
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/vyHb
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/vyHb HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/vyHb(2)
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/vyHb(2)
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/vyHb(2) HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=90
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/ay6u
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/ay6u
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/ay6u HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/vyHb(1)
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/vyHb(1)
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/vyHb(1) HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=91
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/runtime.33b14b045f6fc05b2f4e.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/runtime.33b14b045f6fc05b2f4e.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/runtime.33b14b045f6fc05b2f4e.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=87
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/wfui.11759b41ee721f527bba.chunk.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/wfui.11759b41ee721f527bba.chunk.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/wfui.11759b41ee721f527bba.chunk.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/vendor.11ebf7c8e218fb409798.chunk.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/vendor.11ebf7c8e218fb409798.chunk.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/vendor.11ebf7c8e218fb409798.chunk.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:05 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=91
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/main.2c70436e78e79e8ed3b8.chunk.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/main.2c70436e78e79e8ed3b8.chunk.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/main.2c70436e78e79e8ed3b8.chunk.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:06 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=90
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
connect.secure.wellsfargo.com/auth/login/present?origin=cob&LOB=CONS
159.45.2.156200 9.9 kB URL HTTP/1.1 connect.secure.wellsfargo.com/auth/login/present?origin=cob&LOB=CONS
IP 159.45.2.156:0
ASN #10837 WELLSFARGO-10837
Hash b4be2221417efb041a9c4ac811c0485e
99ee13583f4581b8cccde691f5e0af121687f2ad
caeaddf3410a93a0b91704859de5f1fb2512e01cb533e710506f174e9ebf6598
GET /auth/login/present?origin=cob&LOB=CONS HTTP/1.1
Host: connect.secure.wellsfargo.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
HTTP/1.1 200
Date: Sat, 08 Oct 2022 08:36:06 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Expires: -1
Cache-Control: no-cache, no-store, max-age=0
Set-Cookie: ADRUM_BTa=R:32|g:22cb1e0a-a26d-4cea-a2df-726121e64585; Expires=Sat, 08-Oct-2022 08:36:36 GMT; Path=/; Secure
ADRUM_BTa=R:32|g:22cb1e0a-a26d-4cea-a2df-726121e64585|n:wellsfargo-prod_43732a1d-9afc-4e95-ad69-f4ac78c780a7; Expires=Sat, 08-Oct-2022 08:36:36 GMT; Path=/; Secure
SameSite=None; Expires=Sat, 08-Oct-2022 08:36:36 GMT; Path=/; Secure
ADRUM_BT1=R:32|i:301156; Expires=Sat, 08-Oct-2022 08:36:36 GMT; Path=/; Secure
ADRUM_BT1=R:32|i:301156|e:10; Expires=Sat, 08-Oct-2022 08:36:36 GMT; Path=/; Secure
wfacookie=452022100801360642518751; domain=.wellsfargo.com; path=/; expires=5 Oct 2032 08:36:06 GMT; secure=true; HttpOnly
gingerbread_cookie=AA4301B20F82CC1E480FB9F67EACA834; Path=/auth; Secure; HttpOnly
AuthCookie=81e5ed35-7bae-4162-830c-311bb3fcf8a0; Path=/auth; Secure; HttpOnly
LOGINORIGIN=cob; Domain=wellsfargo.com; Path=/auth; Secure; HttpOnly
AuthCookie=81e5ed35-7bae-4162-830c-311bb3fcf8a0; Path=/auth; Secure; HttpOnly
INLANG=EN; Domain=wellsfargo.com; Expires=Sun, 08-Oct-2023 08:36:06 GMT; Path=/; Secure; HttpOnly
ISD_AB_COOKIE=A; Max-Age=7200; path=/; Domain=connect.secure.wellsfargo.com; Secure; httpOnly
ISD_LA_COOKIE=UdssfBdQpHv727VMcLUbmPvvwnnaXQ2gEA5TrQOnuAa2AwyVUnf/Oc6px2Yg3/Si7kI03aIPC5sjmgAAAAE=; path=/; domain=connect.secure.wellsfargo.com; HttpOnly; Secure
WesdAksn=A5S-vLaDAQAA0wRk8MpdOoC6GFzyel5p1VKJAGV8ft42GifEBTt9Mu6ZofmQAVtaKpqcuC2nwH8AADQwAAAAAA|1|0|c79a5756d4c78ae00217e313457a0de807007ddc; Path=/; Max-Age=1577847600; Domain=wellsfargo.com; Secure
X-XSS-Protection: 1; mode=block
Pragma: no-cache
Content-Security-Policy: default-src 'none'; img-src data: 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com https://www.google-analytics.com https://www.facebook.com https://*.doubleclick.net https://*.google.com https://*.innovid.com https://*.youtube.com https://pdx-col.eum-appdynamics.com; font-src data: 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com; script-src 'nonce-ac2e5e7c-70eb-4060-af40-8fb33b3699d6' 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com s.yimg.com sp.analytics.yahoo.com; style-src 'unsafe-inline' 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com; connect-src 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com https://chatrouter-wellsfargo-test.nod-glb.nuance.com https://api.rlcdn.com https://s.yimg.com https://www.google-analytics.com https://*.doubleclick.net https://pdx-col.eum-appdynamics.com; frame-src 'self' https://*.wellsfargo.com https://*.doubleclick.net https://*.google.com https://awusw-wfr.advanced-web-analytics.com; form-action 'self' https://*.wellsfargo.com https://wellsfargo.com https://*.docusign.net https://*.docusign.com; media-src 'self' https://*.wellsfargo.com https://*.wellsfargoadvisors.com https://*.wfinterface.com https://*.wellsfargomedia.com; plugin-types 'none'; report-uri https://ort.wellsfargo.com/reporting/csp
Strict-Transport-Security: max-age=31536000
Content-Language: en-US
Server: KONICHIWA/1.1
X-UA-Compatible: IE=edge
X-Frame-Options: DENY
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Content-Encoding: gzip
vvellfargo.serveftp.com/main_files/login-userprefs.min.js.download
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/login-userprefs.min.js.download
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/login-userprefs.min.js.download HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:06 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=89
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/saved_resource.html
3.145.208.97200 OK 187 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/saved_resource.html
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash cd1a62c1b06fed542ee26dd2059035c3
9744cab5213693142ed22107f70625be0c92d8eb
d98f43e719b9421abb6bc8ca54d4c4bbcea8404fabe83b73632a810cd1c95057
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/saved_resource.html HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: iframe
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:06 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 09:50:28 GMT
Accept-Ranges: bytes
Content-Length: 187
Keep-Alive: timeout=5, max=91
Connection: Keep-Alive
Content-Type: text/html
vvellfargo.serveftp.com/main_files/src=2549153.html
3.145.208.97200 OK 654 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/src=2549153.html
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, Unicode text, UTF-8 text, with very long lines (339)
Hash 099f571e9d9d2502ac57214a38e125ca
d89431092eea88533f4396bc108f27d17fe719b0
c8e472897aa64ce83afce51949d108c1f621cbf944cb3006bccbd28ad4490bfb
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/src=2549153.html HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: iframe
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:06 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 09:50:28 GMT
Accept-Ranges: bytes
Content-Length: 654
Keep-Alive: timeout=5, max=88
Connection: Keep-Alive
Content-Type: text/html
vvellfargo.serveftp.com/favicon.ico
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/favicon.ico
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
GET /favicon.ico HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:06 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=89
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
vvellfargo.serveftp.com/main_files/saved_resource(1).html
3.145.208.97200 OK 870 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/saved_resource(1).html
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- exported SGML document, ASCII text, with very long lines (755)
Hash 08dbcf3714b1598c85b7788b269f0b4e
3d4966908e35902b81e94e3874cac0e390c11951
78260cad303d4af62ccb32c151e61febed00a153709ca9686f888a7e2899b6b5
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/saved_resource(1).html HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: iframe
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2022 08:36:06 GMT
Server: Apache
Last-Modified: Wed, 29 Jun 2022 09:50:28 GMT
Accept-Ranges: bytes
Content-Length: 870
Keep-Alive: timeout=5, max=90
Connection: Keep-Alive
Content-Type: text/html
vvellfargo.serveftp.com/main_files/src=2549153
3.145.208.97404 Not Found 315 B URL HTTP/1.1 vvellfargo.serveftp.com/main_files/src=2549153
IP 3.145.208.97:0
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, ASCII text
Hash a34ac19f4afae63adc5d2f7bc970c07f
a82190fc530c265aa40a045c21770d967f4767b8
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Analyzer Verdict Alert urlquery DynDNS domain detected
openphish Wells Fargo & Company
fortinet Phishing
GET /main_files/src=2549153 HTTP/1.1
Host: vvellfargo.serveftp.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/main_files/src=2549153.html
Cookie: _cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
HTTP/1.1 404 Not Found
Date: Sat, 08 Oct 2022 08:36:06 GMT
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=87
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
rubicon.wellsfargo.com/glassbox/reporting/0C458F45-AC71-02CE-34D8-401C8A313B38/cls_report?_cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5%3A0&_cls_v=15e3a53a-467c-43bc-b44c-02af2408581b
23.36.79.33200 OK 76 B URL HTTP/1.1 rubicon.wellsfargo.com/glassbox/reporting/0C458F45-AC71-02CE-34D8-401C8A313B38/cls_report?_cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5%3A0&_cls_v=15e3a53a-467c-43bc-b44c-02af2408581b
IP 23.36.79.33:0
ASN #20940 Akamai International B.V.
File type JSON data\012- , ASCII text, with no line terminators
Hash 738429460b24a955dcce57260e22dc64
36a893fd0c5e144cc6d3673c3b41903f1b301c14
eda0c61fc0af4719c8018174ae94a67bbfe709f9c6ee099afae40cafb07d938d
GET /glassbox/reporting/0C458F45-AC71-02CE-34D8-401C8A313B38/cls_report?_cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5%3A0&_cls_v=15e3a53a-467c-43bc-b44c-02af2408581b HTTP/1.1
Host: rubicon.wellsfargo.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: https://vvellfargo.serveftp.com
Connection: keep-alive
Referer: https://vvellfargo.serveftp.com/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
HTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Access-Control-Allow-Origin: https://vvellfargo.serveftp.com
Access-Control-Allow-Credentials: true
Content-Encoding: gzip
Content-Length: 76
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Vary: origin, Accept-Encoding
Date: Sat, 08 Oct 2022 08:36:07 GMT
Connection: keep-alive
Set-Cookie: _cls_v=15e3a53a-467c-43bc-b44c-02af2408581b; Secure; SameSite=None;HttpOnly;Secure
_cls_s=b7a17b23-2c7e-4070-a744-a6b546191eb5:0; Secure; SameSite=None;HttpOnly;Secure
ROUTEID=.cligate1; path=/;HttpOnly;Secure
ISD_GB_COOKIE=!pS49mBVp7QLA0EfjbMKMZ0gdoDa2eZit6HQ6AlYiIulcRhOmJF+XNyr4uCe0TOWZFAcCconPVZcubWU=; path=/; Httponly; Secure
DCID=OCeGj9uYjfl6xg+6hkUdwL5w+USuga2di2MGRIDboI0%3d; Domain=rubicon.wellsfargo.com; Path=/; Expires=Sat, 08 Oct 2022 08:51:07 GMT;Httponly; Secure
Strict-Transport-Security: max-age=31536000 ; includeSubDomains