mail.corpbancafinance.com
Open in
urlscan Pro
198.54.116.49
Malicious Activity!
Public Scan
Effective URL: https://mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/login.php?cmd=login_submit&id=MTIyMzA4OTMwNA==MTIyM...
Submission: On August 08 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on March 9th 2022. Valid for: a year.
This is the only time mail.corpbancafinance.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 9 | 198.54.116.49 198.54.116.49 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
7 | 1 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server226-4.web-hosting.com
mail.corpbancafinance.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
corpbancafinance.com
2 redirects
mail.corpbancafinance.com |
460 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
9 | mail.corpbancafinance.com |
2 redirects
mail.corpbancafinance.com
|
7 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web-hosting.com Sectigo RSA Domain Validation Secure Server CA |
2022-03-09 - 2023-04-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/login.php?cmd=login_submit&id=MTIyMzA4OTMwNA==MTIyMzA4OTMwNA==&session=MTIyMzA4OTMwNA==MTIyMzA4OTMwNA==
Frame ID: 43E8E4A065191346608A688F34782BCB
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Bank of AmericaPage URL History Show full URLs
-
https://mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA
HTTP 301
https://mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/ HTTP 302
https://mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/login.php?cmd=login_submit&id=M... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA
HTTP 301
https://mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/ HTTP 302
https://mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/login.php?cmd=login_submit&id=MTIyMzA4OTMwNA==MTIyMzA4OTMwNA==&session=MTIyMzA4OTMwNA==MTIyMzA4OTMwNA== Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/ Redirect Chain
|
3 KB 944 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.gif
mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/images/ |
95 KB 95 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xy.gif
mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/images/ |
169 KB 170 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xz.gif
mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/images/ |
66 KB 66 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xv.gif
mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/images/ |
61 KB 61 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xx.gif
mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/images/ |
53 KB 53 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ss.gif
mail.corpbancafinance.com/ui.unemployment.payment.secure.ui/banks/BofA/images/ |
13 KB 14 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| validateMyForm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mail.corpbancafinance.com
198.54.116.49
43e8c884dd0f1c4a43e7b8399552292fa1d11ec78f3c61125aa6a3c280912f10
56dfebb4c229d75532f86752fa8ea9298421a92734b4ec791f4089c4d2348ced
d36dfdc73a1dfcfbf3e50e1a22c04b6de673187d5b545568202a6dc366c01d72
d4aaf731ff9064f7cccdd97ae52686f8f5a188de595e710c68045fd3eb22dc56
d5f410c6d918fb824b003de14a69e7d4830c4e11ea95e4ec4bdfbe33f4e7be9a
dd9ad93ca953c8e33bdf091ba57ff3a3111578df3513e61b656545bbc8a7f0da
e6feb6966b8310e37db729a8a5ff2735b483c4495455c47a512aa5225fe25d02