fcuamoco03b.com Open in urlscan Pro
2606:4700:3034::ac43:9de5  Malicious Activity! Public Scan

Submitted URL: https://fcuamoco03b.com/
Effective URL: https://fcuamoco03b.com/desktop/signin.php
Submission: On January 31 via api from US — Scanned from US

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2606:4700:3034::ac43:9de5, located in United States and belongs to CLOUDFLARENET, US. The main domain is fcuamoco03b.com.
TLS certificate: Issued by GTS CA 1P5 on January 30th 2024. Valid for: 3 months.
This is the only time fcuamoco03b.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: AMOCO Federal Credit Union (Financial)

Domain & IP information

IP Address AS Autonomous System
2 3 2606:4700:303... 13335 (CLOUDFLAR...)
1 2
Apex Domain
Subdomains
Transfer
3 fcuamoco03b.com
fcuamoco03b.com
482 KB
1 1
Domain Requested by
3 fcuamoco03b.com 2 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid
fcuamoco03b.com
GTS CA 1P5
2024-01-30 -
2024-04-29
3 months crt.sh

This page contains 1 frames:

Primary Page: https://fcuamoco03b.com/desktop/signin.php
Frame ID: D0EFF33A999D711BCB84EE7614D42E3F
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

AMOCO FCU

Page URL History Show full URLs

  1. https://fcuamoco03b.com/ HTTP 302
    https://fcuamoco03b.com/desktop/ HTTP 302
    https://fcuamoco03b.com/desktop/signin.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

563 kB
Transfer

1946 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://fcuamoco03b.com/ HTTP 302
    https://fcuamoco03b.com/desktop/ HTTP 302
    https://fcuamoco03b.com/desktop/signin.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request signin.php
fcuamoco03b.com/desktop/
Redirect Chain
  • https://fcuamoco03b.com/
  • https://fcuamoco03b.com/desktop/
  • https://fcuamoco03b.com/desktop/signin.php
2 MB
481 KB
Document
General
Full URL
https://fcuamoco03b.com/desktop/signin.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3034::ac43:9de5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7ba83178ff1081ca9cf04dba7981a6fc0f344d09323afe44b6a011a6020e1635

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cache-control
no-store, no-cache, must-revalidate
cf-cache-status
DYNAMIC
cf-ray
84e302a9eeca09fe-MIA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Wed, 31 Jan 2024 15:32:58 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
pragma
no-cache
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ONvBUJ6GX%2F8IjKMvcYnjpnIcCIg60rduvwhpsFApxJPQ1eTzv2cmP207cqQH%2BKqHp5FBxswFuc%2FGN7AHMArYbRhp%2FAT9glADVNAsAAu0BL4bGZpUjhN9%2FDgoby2rH1EA99h5GMpzY12mdHGtQSs%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding

Redirect headers

alt-svc
h3=":443"; ma=86400
cache-control
no-store, no-cache, must-revalidate
cf-cache-status
DYNAMIC
cf-ray
84e302a81bfb09fe-MIA
content-type
text/html; charset=UTF-8
date
Wed, 31 Jan 2024 15:32:58 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
signin.php
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
pragma
no-cache
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=kZY8T1N%2Fc%2BYQFTzbvAQWi4vFrFD0H0WIAOWljsXzlSN7%2BuDKv6dR0HpmGpMOkl1esglhmbEGUGi5BlaZu35cAcUTpNRMqlSxk2lan9MqAnD2ziF4NxSeoC2Jcws0uSGuHe7oFbih44V2w6%2BcsdA%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
truncated
/
15 KB
15 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f6734f8177112c0839b961f96d813fcb189d81b60e96c33278c1983b6f419615

Request headers

Referer
Origin
https://fcuamoco03b.com
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
128 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f56f710ed51e12701efb353b0a16d40fb8f99136cb27f1f0cc264476c185178e

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
15 KB
15 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f5aebdfea35d1e7656ef4acc5db1f243209755ae3300943ef8fc6280f363c860

Request headers

Referer
Origin
https://fcuamoco03b.com
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
51 KB
51 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0d7ce2637795f271eddafb55abce08bfc736e366d9d3eb89c5167c5867f73561

Request headers

Referer
Origin
https://fcuamoco03b.com
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: AMOCO Federal Credit Union (Financial)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader

1 Cookies

Domain/Path Name / Value
fcuamoco03b.com/ Name: PHPSESSID
Value: flpcnukk3l3hba2sd0dp9rapig