suncoarst.click
Open in
urlscan Pro
198.54.115.110
Malicious Activity!
Public Scan
Effective URL: https://suncoarst.click/
Submission: On April 04 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on April 3rd 2022. Valid for: a year.
This is the only time suncoarst.click was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Suncoast Credit Union (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 8 | 198.54.115.110 198.54.115.110 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
2 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:803::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2606:4700:10:... 2606:4700:10::6814:54a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:803::2003 | 15169 (GOOGLE) (GOOGLE) | |
14 | 6 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server225-2.web-hosting.com
suncoarst.click |
ASN13335 (CLOUDFLARENET, US)
banking.suncoastcreditunion.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
suncoarst.click
1 redirects
suncoarst.click |
68 KB |
2 |
suncoastcreditunion.com
banking.suncoastcreditunion.com — Cisco Umbrella Rank: 493642 |
29 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 694 |
70 KB |
1 |
gstatic.com
fonts.gstatic.com |
44 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 229 |
27 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 45 |
1 KB |
14 | 6 |
Domain | Requested by | |
---|---|---|
8 | suncoarst.click |
1 redirects
suncoarst.click
|
2 | banking.suncoastcreditunion.com |
suncoarst.click
|
2 | maxcdn.bootstrapcdn.com |
suncoarst.click
maxcdn.bootstrapcdn.com |
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | cdnjs.cloudflare.com |
suncoarst.click
|
1 | fonts.googleapis.com |
suncoarst.click
|
14 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.suncoastcreditunion.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
suncoarst.click Sectigo RSA Domain Validation Secure Server CA |
2022-04-03 - 2023-04-03 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-03-17 - 2022-06-09 |
3 months | crt.sh |
suncoastcreditunion.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-07-15 - 2022-08-15 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-03-17 - 2022-06-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://suncoarst.click/
Frame ID: 3ABB7D32C658C65CB91D6AE9E75ACD6B
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
Welcome to Online BankingPage URL History Show full URLs
-
http://suncoarst.click/
HTTP 301
https://suncoarst.click/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Log Into SunNet
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://suncoarst.click/
HTTP 301
https://suncoarst.click/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
suncoarst.click/ Redirect Chain
|
19 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
suncoarst.click/assets/ |
265 KB 42 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
suncoarst.click/assets/ |
15 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.4.0/css/ |
26 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
21 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smart-app-banner.css
suncoarst.click/assets/ |
6 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Authentication.css
suncoarst.click/assets/ |
2 KB 686 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mainlogo.gif
suncoarst.click/assets/ |
5 KB 6 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Wait64.gif
banking.suncoastcreditunion.com/Content/Images/ |
27 KB 27 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loader.gif
banking.suncoastcreditunion.com/Content/ |
2 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/ |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
suncoarst.click// |
38 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v28/ |
44 KB 44 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.4.0/fonts/ |
63 KB 64 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Suncoast Credit Union (Banking)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails function| $ function| jQuery function| _0x22543f function| _0x5393 function| _0x7ab90 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banking.suncoastcreditunion.com
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
suncoarst.click
198.54.115.110
2606:4700:10::6814:54a
2606:4700::6811:180e
2606:4700::6812:acf
2a00:1450:4001:803::2003
2a00:1450:4001:803::200a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