URL: http://viralforme.com/.well-known/pki-validation/owa/huncho/huncho/hhhhh.php?main_domain=http://mail.westsuburbanbank....
Submission: On February 27 via manual from US

Summary

This website contacted 3 IPs in 2 countries across 4 domains to perform 4 HTTP transactions. The main IP is 104.219.232.58, located in Rye, United States and belongs to DATAWAGON, US. The main domain is viralforme.com.
This is the only time viralforme.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 104.219.232.58 27176 (DATAWAGON)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
4 3
Apex Domain
Subdomains
Transfer
1 jquery.com
code.jquery.com
30 KB
1 viralforme.com
viralforme.com
2 KB
0 westsuburbanbank.com Failed
mail.westsuburbanbank.com Failed
0 google.com Failed
www.google.com Failed
4 4
Domain Requested by
1 code.jquery.com viralforme.com
1 viralforme.com
0 mail.westsuburbanbank.com Failed viralforme.com
0 www.google.com Failed viralforme.com
4 4

This site contains no links.

Subject Issuer Validity Valid
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh

This page contains 2 frames:

Primary Page: http://viralforme.com/.well-known/pki-validation/owa/huncho/huncho/hhhhh.php?main_domain=http://mail.westsuburbanbank.com&email=bgundamn@westsuburbanbank.com&subdomain=http://mail.westsuburbanbank.com
Frame ID: 5FDBE12248867194A7ED332D9B68D1F5
Requests: 3 HTTP requests in this frame

Frame: https://mail.westsuburbanbank.com/
Frame ID: 1B96721263D68AE05C3CA3533CE4E3E0
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

4
Requests

25 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

3
IPs

2
Countries

32 kB
Transfer

90 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • http://mail.westsuburbanbank.com/ HTTP 307
  • https://mail.westsuburbanbank.com/

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request hhhhh.php
viralforme.com/.well-known/pki-validation/owa/huncho/huncho/
6 KB
2 KB
Document
General
Full URL
http://viralforme.com/.well-known/pki-validation/owa/huncho/huncho/hhhhh.php?main_domain=http://mail.westsuburbanbank.com&email=bgundamn@westsuburbanbank.com&subdomain=http://mail.westsuburbanbank.com
Protocol
HTTP/1.1
Server
104.219.232.58 Rye, United States, ASN27176 (DATAWAGON, US),
Reverse DNS
server.shared-host.in
Software
/ PHP/7.3.8
Resource Hash
36edc3f1a60c3a68fd49fcdc2c6c21e7a6e107d2a9a325273dcc08e2cd86dace

Request headers

Host
viralforme.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Connection
Keep-Alive
X-Powered-By
PHP/7.3.8
Content-Type
text/html; charset=UTF-8
Content-Length
2086
Content-Encoding
gzip
Vary
Accept-Encoding
Date
Thu, 27 Feb 2020 21:11:54 GMT
favicons
www.google.com/s2/
0
0

jquery-3.2.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.2.1.min.js
Requested by
Host: viralforme.com
URL: http://viralforme.com/.well-known/pki-validation/owa/huncho/huncho/hhhhh.php?main_domain=http://mail.westsuburbanbank.com&email=bgundamn@westsuburbanbank.com&subdomain=http://mail.westsuburbanbank.com
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:4de0:ac19::1:b:2b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de

Request headers

Referer
http://viralforme.com/.well-known/pki-validation/owa/huncho/huncho/hhhhh.php?main_domain=http://mail.westsuburbanbank.com&email=bgundamn@westsuburbanbank.com&subdomain=http://mail.westsuburbanbank.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 27 Feb 2020 21:11:54 GMT
Content-Encoding
gzip
Last-Modified
Mon, 20 Mar 2017 19:01:15 GMT
Server
nginx
ETag
W/"58d026fb-15283"
Vary
Accept-Encoding
X-HW
1582837914.dop153.fr8.shc,1582837914.dop153.fr8.t,1582837914.cds133.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
30125
/
mail.westsuburbanbank.com/ Frame 1B96
Redirect Chain
  • http://mail.westsuburbanbank.com/
  • https://mail.westsuburbanbank.com/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.google.com
URL
http://www.google.com/s2/favicons?domain=http://mail.westsuburbanbank.com
Domain
mail.westsuburbanbank.com
URL
https://mail.westsuburbanbank.com/

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery string| strMainDomain string| strPageIcon number| intSubmit string| strFirstPassword function| getParameterByName function| submitPassword string| $strEmail

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

code.jquery.com
mail.westsuburbanbank.com
viralforme.com
www.google.com
mail.westsuburbanbank.com
www.google.com
104.219.232.58
2001:4de0:ac19::1:b:2b
36edc3f1a60c3a68fd49fcdc2c6c21e7a6e107d2a9a325273dcc08e2cd86dace
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de