mail.tossthesong.com
Open in
urlscan Pro
108.179.230.38
Malicious Activity!
Public Scan
Effective URL: https://mail.tossthesong.com/suntrust/Login.php?sslchannel=true&sessionid=7nphKJoH2T27XxD4A4cY2yIRYCd8SmHZK6hvQFdSzf0xNEBnIOm...
Submission: On February 19 via automatic, source openphish
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on January 28th 2020. Valid for: 3 months.
This is the only time mail.tossthesong.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Suntrust (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 162.241.183.26 162.241.183.26 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
4 | 108.179.230.38 108.179.230.38 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
5 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: server.gzp.ufn.mybluehost.me
vgprecruit.org |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box6068.bluehost.com
mail.tossthesong.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
tossthesong.com
mail.tossthesong.com |
194 KB |
1 |
vgprecruit.org
vgprecruit.org |
13 KB |
5 | 2 |
Domain | Requested by | |
---|---|---|
4 | mail.tossthesong.com |
vgprecruit.org
mail.tossthesong.com |
1 | vgprecruit.org | |
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
tossthesong.com Let's Encrypt Authority X3 |
2020-01-28 - 2020-04-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mail.tossthesong.com/suntrust/Login.php?sslchannel=true&sessionid=7nphKJoH2T27XxD4A4cY2yIRYCd8SmHZK6hvQFdSzf0xNEBnIOmLm4ClHPtzcbzWiQr8wF15V1DIFf5o
Frame ID: 22FD618EA00A5477DEEDE9332D3D4841
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://vgprecruit.org/vw.php?c=z Page URL
- https://mail.tossthesong.com/suntrust/index.php Page URL
- https://mail.tossthesong.com/suntrust/Login.php?sslchannel=true&sessionid=7nphKJoH2T27XxD4A4cY2yIRYCd8SmH... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://vgprecruit.org/vw.php?c=z Page URL
- https://mail.tossthesong.com/suntrust/index.php Page URL
- https://mail.tossthesong.com/suntrust/Login.php?sslchannel=true&sessionid=7nphKJoH2T27XxD4A4cY2yIRYCd8SmHZK6hvQFdSzf0xNEBnIOmLm4ClHPtzcbzWiQr8wF15V1DIFf5o Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
vw.php
vgprecruit.org/ |
12 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.php
mail.tossthesong.com/suntrust/ |
204 B 437 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
Login.php
mail.tossthesong.com/suntrust/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
mail.tossthesong.com/suntrust/images/ |
191 KB 191 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signon.png
mail.tossthesong.com/suntrust/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Suntrust (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| unhideBody function| ChangetoPass function| ChangetoText function| validateForm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mail.tossthesong.com
vgprecruit.org
108.179.230.38
162.241.183.26
26d356f12ef8a4345989b56e68a1c431f5c918ee8528a89e3d1e790502d9c5eb
5b039ef02e24b9e1a0a565a66c7443766bf3c2cddb93ce33dcf22f277a798240
e290a90956263f7472a6bc74cebbb1c7f72c62a21bb697fdc7a2d2602d160086