bofasonline.grrasawstraining.com
Open in
urlscan Pro
142.54.176.178
Malicious Activity!
Public Scan
Submission: On December 23 via automatic, source phishtank
Summary
This is the only time bofasonline.grrasawstraining.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 142.54.176.178 142.54.176.178 | 33387 (NOCIX) (NOCIX - DataShack) | |
4 | 171.161.202.200 171.161.202.200 | 10794 (BANKAMERICA) (BANKAMERICA - Bank of America) | |
1 | 3.219.4.149 3.219.4.149 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 | 54.172.71.231 54.172.71.231 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 | 18.235.125.122 18.235.125.122 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
9 | 5 |
ASN33387 (NOCIX - DataShack, LC, US)
PTR: host2.cloudlinuxshare.in
bofasonline.grrasawstraining.com |
ASN10794 (BANKAMERICA - Bank of America, National Association, US)
secure.bankofamerica.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-3-219-4-149.compute-1.amazonaws.com
aero.bankofamerica.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-54-172-71-231.compute-1.amazonaws.com
boss.bankofamerica.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-18-235-125-122.compute-1.amazonaws.com
dull.bankofamerica.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
bankofamerica.com
secure.bankofamerica.com aero.bankofamerica.com boss.bankofamerica.com dull.bankofamerica.com |
42 KB |
2 |
grrasawstraining.com
bofasonline.grrasawstraining.com |
4 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
4 | secure.bankofamerica.com |
bofasonline.grrasawstraining.com
|
2 | bofasonline.grrasawstraining.com |
bofasonline.grrasawstraining.com
|
1 | dull.bankofamerica.com |
bofasonline.grrasawstraining.com
|
1 | boss.bankofamerica.com |
bofasonline.grrasawstraining.com
|
1 | aero.bankofamerica.com |
bofasonline.grrasawstraining.com
|
9 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bankofamerica.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
secure.bankofamerica.com Entrust Certification Authority - L1M |
2019-07-28 - 2020-07-25 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://bofasonline.grrasawstraining.com/billing.html
Frame ID: 4EE97A45838B80EC28CF1902E2C7BC8E
Requests: 9 HTTP requests in this frame
2 Outgoing links
These are links going to different origins than the main page.
Title: Bill Pay
Search URL Search Domain Scan URL
Title: Deposit Checks
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
billing.html
bofasonline.grrasawstraining.com/ |
20 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.css
bofasonline.grrasawstraining.com/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v2-jawr.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/ |
218 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bac_reg_logo_tmp_250X69.gif
secure.bankofamerica.com/content/images/ContextualSiteGraphics/Logos/en_US/ |
4 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v2-jawr-print.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/ |
302 B 812 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
I3n.js
aero.bankofamerica.com/30306/ |
571 B 918 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a8e.js
boss.bankofamerica.com/30306/ |
571 B 918 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
y9h.js
dull.bankofamerica.com/boaa/ |
571 B 918 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-secure-esp-sprite.png
secure.bankofamerica.com/pa/components/modules/header-module/2.8/graphic/ |
473 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| getSCookie function| get_SessionIdString object| boaPageDataJS object| theBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aero.bankofamerica.com
bofasonline.grrasawstraining.com
boss.bankofamerica.com
dull.bankofamerica.com
secure.bankofamerica.com
142.54.176.178
171.161.202.200
18.235.125.122
3.219.4.149
54.172.71.231
0f94d91a4debc231f5d0e89edf3d707916778c9393333ac3ca49d3adc80cf600
2685d0b576e6b9b5690c3f92a7093f2a24194c410452288d97c54d19dcf30160
6faff1c939a50b046b98c124b959cb7cba4782252358581a19cbb06e9896afdc
82f2126c75d1cda90e6690664654243944b495f4107fea024134245744cf16e3
8c37fb372596058d87dd9208541c49b020d0e840e4f3a5baa27d39be2dc70b01
dcc20632135c4c6ebe55389bee231f39e82454458ac4b76b9cb88e49894ff2eb