gettrainedgetplaced.tech Open in urlscan Pro
45.113.122.63  Malicious Activity! Public Scan

Submitted URL: https://wulod-alternate.app.link/
Effective URL: https://gettrainedgetplaced.tech/b2020r/
Submission: On February 19 via manual from US

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 3 HTTP transactions. The main IP is 45.113.122.63, located in India and belongs to PUBLIC-DOMAIN-REGISTRY, US. The main domain is gettrainedgetplaced.tech.
TLS certificate: Issued by Let's Encrypt Authority X3 on January 8th 2020. Valid for: 3 months.
This is the only time gettrainedgetplaced.tech was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 2600:9000:214... 16509 (AMAZON-02)
3 45.113.122.63 394695 (PUBLIC-DO...)
3 1
Apex Domain
Subdomains
Transfer
3 gettrainedgetplaced.tech
gettrainedgetplaced.tech
73 KB
1 app.link
wulod-alternate.app.link
627 B
3 2
Domain Requested by
3 gettrainedgetplaced.tech gettrainedgetplaced.tech
1 wulod-alternate.app.link 1 redirects
3 2

This site contains no links.

Subject Issuer Validity Valid
gettrainedgetplaced.tech
Let's Encrypt Authority X3
2020-01-08 -
2020-04-07
3 months crt.sh

This page contains 1 frames:

Primary Page: https://gettrainedgetplaced.tech/b2020r/
Frame ID: BF1A24646269CA436DCA1885BFB05E7D
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://wulod-alternate.app.link/ HTTP 307
    https://gettrainedgetplaced.tech/b2020r/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

73 kB
Transfer

141 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://wulod-alternate.app.link/ HTTP 307
    https://gettrainedgetplaced.tech/b2020r/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
gettrainedgetplaced.tech/b2020r/
Redirect Chain
  • https://wulod-alternate.app.link/
  • https://gettrainedgetplaced.tech/b2020r/
444 B
625 B
Document
General
Full URL
https://gettrainedgetplaced.tech/b2020r/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.113.122.63 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
md-in-72.webhostbox.net
Software
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7 / PHP/7.2.16
Resource Hash
aec85539ff49eb5bdf69c519565d761d5ab7154f74f6e74b96bb038db2218d25

Request headers

:method
GET
:authority
gettrainedgetplaced.tech
:scheme
https
:path
/b2020r/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
document
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

status
200
date
Wed, 19 Feb 2020 18:28:04 GMT
server
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7
x-powered-by
PHP/7.2.16
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
set-cookie
cazanova=5831fe921715f004096b19fd1a218428cf0a7399; expires=Wed, 19-Feb-2020 20:28:04 GMT; Max-Age=7200; path=/; HttpOnly
vary
Accept-Encoding
content-encoding
gzip
content-length
298
content-type
text/html; charset=UTF-8

Redirect headers

Content-Length
0
Connection
keep-alive
Server
openresty/1.13.6.2
Date
Wed, 19 Feb 2020 18:28:00 GMT
X-Powered-By
Express
Set-Cookie
_s=dtw0uNCjEsDrste84uq8ty6s2iTDc%2F216Qi7aa9g4Avn0DBZ9QHQvZZJBnypIegK; Max-Age=31536000; Domain=.app.link; Path=/; Expires=Thu, 18 Feb 2021 18:28:00 GMT
Last-Modified
Wed, 19 Feb 2020 18:28:00 GMT
Location
https://gettrainedgetplaced.tech/b2020r/
X-Cache
Miss from cloudfront
Via
1.1 80d90c7955dda88e3912960ead8e99d6.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
KdCBF5uEenLg8hHP3hONP2IeHTyA1z_gkgl7D4RlCpmn5jKFv_w-zw==
captcha.js
gettrainedgetplaced.tech/b2020r//assets/js/
123 KB
54 KB
Script
General
Full URL
https://gettrainedgetplaced.tech/b2020r//assets/js/captcha.js
Requested by
Host: gettrainedgetplaced.tech
URL: https://gettrainedgetplaced.tech/b2020r/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.113.122.63 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
md-in-72.webhostbox.net
Software
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7 /
Resource Hash
abda937cf2741f8b08acc1fa946f155ee91073120f8de3dbcd26f70fc24f698b

Request headers

Referer
https://gettrainedgetplaced.tech/b2020r/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 19 Feb 2020 18:28:04 GMT
content-encoding
gzip
last-modified
Wed, 19 Feb 2020 16:04:28 GMT
server
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7
etag
"e8e17d0-1ecbb-59eeff1700a30-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
captcha.png
gettrainedgetplaced.tech/b2020r//
17 KB
18 KB
Image
General
Full URL
https://gettrainedgetplaced.tech/b2020r//captcha.png?_1582136887179
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.113.122.63 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
md-in-72.webhostbox.net
Software
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7 / PHP/7.2.16
Resource Hash
61e191734bc1ea3493da5babdcd03eb74d004410f3c7401e25d48e0024d8c362

Request headers

Referer
https://gettrainedgetplaced.tech/b2020r/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 19 Feb 2020 18:28:07 GMT
content-encoding
gzip
server
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7
x-powered-by
PHP/7.2.16
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
no-store, no-cache, must-revalidate
expires
Thu, 19 Nov 1981 08:52:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| setImmediate function| clearImmediate function| Vue

1 Cookies

Domain/Path Name / Value
gettrainedgetplaced.tech/ Name: cazanova
Value: 5831fe921715f004096b19fd1a218428cf0a7399