bbt.bank.online.update.st.login.moshiur.net Open in urlscan Pro
2404:2f40:1a0a:1a0e::27a  Malicious Activity! Public Scan

Submitted URL: https://storli.biz/wp-content/
Effective URL: https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
Submission Tags: 7153583
Submission: On June 03 via api from NL

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 2404:2f40:1a0a:1a0e::27a, located in Bangladesh and belongs to XEON-BD Xeon, BD. The main domain is bbt.bank.online.update.st.login.moshiur.net.
TLS certificate: Issued by cPanel, Inc. Certification Authority on May 20th 2021. Valid for: 3 months.
This is the only time bbt.bank.online.update.st.login.moshiur.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: BB&T Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 217.170.198.100 34989 (SERVETHEW...)
4 2404:2f40:1a0... 133938 (XEON-BD Xeon)
5 2
Apex Domain
Subdomains
Transfer
4 moshiur.net
bbt.bank.online.update.st.login.moshiur.net
54 KB
1 storli.biz
storli.biz
360 B
5 2
Domain Requested by
4 bbt.bank.online.update.st.login.moshiur.net bbt.bank.online.update.st.login.moshiur.net
1 storli.biz
5 2

This site contains no links.

Subject Issuer Validity Valid
storli.biz
R3
2021-04-25 -
2021-07-24
3 months crt.sh
bbt.bank.online.update.st.login.moshiur.net
cPanel, Inc. Certification Authority
2021-05-20 -
2021-08-18
3 months crt.sh

This page contains 1 frames:

Primary Page: https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
Frame ID: 82F4DE02AC77CAC8C5BAA067AD98DF3F
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://storli.biz/wp-content/ Page URL
  2. https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

54 kB
Transfer

130 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://storli.biz/wp-content/ Page URL
  2. https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
storli.biz/wp-content/
126 B
360 B
Document
General
Full URL
https://storli.biz/wp-content/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
217.170.198.100 , Norway, ASN34989 (SERVETHEWORLD-AS, NO),
Reverse DNS
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
2959266f6833b5b1ab3b6657a2052dc7fa06118691d038af0dcb6afe43c24380

Request headers

Host
storli.biz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 03 Jun 2021 14:46:29 GMT
Server
Apache/2.4.7 (Ubuntu)
Vary
Accept-Encoding
Content-Encoding
gzip
X-Hostname
linweb09.kiguna.net
Content-Length
132
Content-Type
text/html; charset=UTF-8
Primary Request /
bbt.bank.online.update.st.login.moshiur.net/bbt2021/
466 B
634 B
Document
General
Full URL
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:2f40:1a0a:1a0e::27a , Bangladesh, ASN133938 (XEON-BD Xeon, BD),
Reverse DNS
Software
LiteSpeed /
Resource Hash
c33f1d79ff8a5225bb8136d5dc85c3bd138566184a0345b41301f06ff2bbca66

Request headers

:method
GET
:authority
bbt.bank.online.update.st.login.moshiur.net
:scheme
https
:path
/bbt2021/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
document
referer
https://storli.biz/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://storli.biz/

Response headers

set-cookie
cazanova=45fa89b0732f743216b704cb2866d7c8a4daf8b8; expires=Thu, 03-Jun-2021 16:46:29 GMT; Max-Age=7200; path=/; HttpOnly; secure
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
content-type
text/html; charset=UTF-8
content-length
227
content-encoding
br
vary
Accept-Encoding
date
Thu, 03 Jun 2021 14:46:30 GMT
server
LiteSpeed
alt-svc
quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
captcha.js
bbt.bank.online.update.st.login.moshiur.net/bbt2021/assets/js/
118 KB
41 KB
Script
General
Full URL
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/assets/js/captcha.js
Requested by
Host: bbt.bank.online.update.st.login.moshiur.net
URL: https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2404:2f40:1a0a:1a0e::27a , Bangladesh, ASN133938 (XEON-BD Xeon, BD),
Reverse DNS
Software
LiteSpeed /
Resource Hash
6f7d1dc4867c2df3a57e5ab46e45d755e11eee0abbefa53a22e56219fcd89c61

Request headers

:path
/bbt2021/assets/js/captcha.js
pragma
no-cache
cookie
cazanova=45fa89b0732f743216b704cb2866d7c8a4daf8b8
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bbt.bank.online.update.st.login.moshiur.net
referer
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 03 Jun 2021 14:46:30 GMT
content-encoding
br
last-modified
Tue, 15 Sep 2020 11:59:38 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
42045
expires
Thu, 10 Jun 2021 14:46:30 GMT
captcha.png
bbt.bank.online.update.st.login.moshiur.net/bbt2021/
6 KB
6 KB
Image
General
Full URL
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/captcha.png?_1622731593605
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:2f40:1a0a:1a0e::27a , Bangladesh, ASN133938 (XEON-BD Xeon, BD),
Reverse DNS
Software
LiteSpeed /
Resource Hash
356a39d2101093021cb1ec17435bcc95c0f724d57b1938a3e2db2950e4ae67d7

Request headers

:path
/bbt2021/captcha.png?_1622731593605
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
bbt.bank.online.update.st.login.moshiur.net
referer
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 03 Jun 2021 14:46:33 GMT
cache-control
no-store, no-cache, must-revalidate
expires
Thu, 19 Nov 1981 08:52:00 GMT
server
LiteSpeed
set-cookie
cazanova=6f4f1708cc2139b2a404b9a30a7f2cf8ba9b343b; expires=Thu, 03-Jun-2021 16:46:33 GMT; Max-Age=7200; path=/; HttpOnly; secure
content-type
image/png
2134651.png
bbt.bank.online.update.st.login.moshiur.net/bbt2021/
6 KB
6 KB
Image
General
Full URL
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/2134651.png
Requested by
Host: bbt.bank.online.update.st.login.moshiur.net
URL: https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:2f40:1a0a:1a0e::27a , Bangladesh, ASN133938 (XEON-BD Xeon, BD),
Reverse DNS
Software
LiteSpeed /
Resource Hash
d80353db58e2c6be8a2a5649191a2cc72aaa54e3dcea63e243f2fc76d2284b05

Request headers

:path
/bbt2021/2134651.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
bbt.bank.online.update.st.login.moshiur.net
referer
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bbt.bank.online.update.st.login.moshiur.net/bbt2021/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 03 Jun 2021 14:46:33 GMT
last-modified
Sun, 03 Jan 2021 21:36:38 GMT
server
LiteSpeed
content-type
image/png
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
6228
expires
Thu, 10 Jun 2021 14:46:33 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: BB&T Bank (Banking)

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| setImmediate function| clearImmediate function| Vue

1 Cookies

Domain/Path Name / Value
bbt.bank.online.update.st.login.moshiur.net/ Name: cazanova
Value: 45fa89b0732f743216b704cb2866d7c8a4daf8b8