strikemall.com
Open in
urlscan Pro
2606:4700:30::681b:bed5
Malicious Activity!
Public Scan
Submission: On July 08 via automatic, source openphish
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on June 16th 2019. Valid for: 6 months.
This is the only time strikemall.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 2606:4700:30:... 2606:4700:30::681b:bed5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
strikemall.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
strikemall.com
strikemall.com |
955 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | strikemall.com |
strikemall.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni175348.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-06-16 - 2019-12-23 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/sitekey.html
Frame ID: 63A5D513734462C05AE2B14DD08CF2D4
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
sitekey.html
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/ |
8 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/vendor/bootstrap/css/ |
122 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/fonts/font-awesome-4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
material-design-iconic-font.min.css
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/fonts/iconic/css/ |
69 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/css/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.gif
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/images/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.min.js
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/vendor/jquery/ |
85 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.inputmask.bundle.js
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/vendor/js/ |
113 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.js
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/vendor/bootstrap/js/ |
33 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/vendor/bootstrap/js/ |
50 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lock.png
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/images/ |
473 B 563 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Montserrat-Bold.ttf
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/fonts/montserrat/ |
255 KB 256 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Montserrat-SemiBold.ttf
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/fonts/montserrat/ |
255 KB 255 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Montserrat-Medium.ttf
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/fonts/montserrat/ |
254 KB 254 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
strikemall.com/translations/en/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/Sessi0n_SSi_2555000963/2525555_52558x68584854/b0a/66525_56669/en2/fonts/font-awesome-4.7.0/fonts/ |
75 KB 75 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| Inputmask function| Popper1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.strikemall.com/ | Name: __cfduid Value: d25906b56b8417db3436cbfacccb4fb601562583816 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
strikemall.com
2606:4700:30::681b:bed5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