et.thcscapes.com Open in urlscan Pro
104.250.178.34  Malicious Activity! Public Scan

URL: http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
Submission: On August 11 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 104.250.178.34, located in Addis Ababa, Ethiopia and belongs to VOXILITY, GB. The main domain is et.thcscapes.com.
This is the only time et.thcscapes.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
5 104.250.178.34 3223 (VOXILITY)
5 1
Apex Domain
Subdomains
Transfer
5 thcscapes.com
et.thcscapes.com
132 KB
5 1
Domain Requested by
5 et.thcscapes.com et.thcscapes.com
5 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
Frame ID: 9C15DB8DDB56046B8A5D248A9C76C5F1
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

132 kB
Transfer

131 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request challengevdl.php
et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/
13 KB
13 KB
Document
General
Full URL
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
Protocol
HTTP/1.1
Server
104.250.178.34 Addis Ababa, Ethiopia, ASN3223 (VOXILITY, GB),
Reverse DNS
Software
Apache /
Resource Hash
514a35757d4c2cf01cb73259d9855b917b59d87792acb479b3868fa1a8fda343

Request headers

Host
et.thcscapes.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 11 Aug 2020 13:18:19 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style1.css
et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/images/
3 KB
4 KB
Stylesheet
General
Full URL
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/images/style1.css
Requested by
Host: et.thcscapes.com
URL: http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
Protocol
HTTP/1.1
Server
104.250.178.34 Addis Ababa, Ethiopia, ASN3223 (VOXILITY, GB),
Reverse DNS
Software
Apache /
Resource Hash
94f243198ac37ef309f89bf03a8faf0c93c1c5a45a39f46c1ca7491306b0ac68

Request headers

Referer
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 11 Aug 2020 13:18:19 GMT
Last-Modified
Sat, 06 Feb 2016 21:37:06 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
3415
new%20header.png
et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/images/
104 KB
105 KB
Image
General
Full URL
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/images/new%20header.png
Requested by
Host: et.thcscapes.com
URL: http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
Protocol
HTTP/1.1
Server
104.250.178.34 Addis Ababa, Ethiopia, ASN3223 (VOXILITY, GB),
Reverse DNS
Software
Apache /
Resource Hash
1dbaa336651d898b99626cd80ec5f2ca9b0971429d6e0d9c20bead1322c362c7

Request headers

Referer
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 11 Aug 2020 13:18:19 GMT
Last-Modified
Sat, 06 Feb 2016 21:37:04 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
106895
confirm.png
et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/images/
2 KB
2 KB
Image
General
Full URL
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/images/confirm.png
Requested by
Host: et.thcscapes.com
URL: http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
Protocol
HTTP/1.1
Server
104.250.178.34 Addis Ababa, Ethiopia, ASN3223 (VOXILITY, GB),
Reverse DNS
Software
Apache /
Resource Hash
3bd5ac9684632300424ca98cbe5c5ee9af57d20ba97ced23899daf5ea9bd6685

Request headers

Referer
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 11 Aug 2020 13:18:20 GMT
Last-Modified
Sat, 06 Feb 2016 21:37:04 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
2154
footer.png
et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/images/
8 KB
8 KB
Image
General
Full URL
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/images/footer.png
Requested by
Host: et.thcscapes.com
URL: http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
Protocol
HTTP/1.1
Server
104.250.178.34 Addis Ababa, Ethiopia, ASN3223 (VOXILITY, GB),
Reverse DNS
Software
Apache /
Resource Hash
0d22d47085a0a1a7e91bae350314ae43b527cd753245e62d3f3d136fb509b9ec

Request headers

Referer
http://et.thcscapes.com/bofaoa/secure.bankofamerica.comloginsign-insignOnV2Screen.go/challengevdl.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 11 Aug 2020 13:18:20 GMT
Last-Modified
Mon, 04 Dec 2017 10:25:10 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
8135

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| unhideBody

0 Cookies