fcuamoco03b.com Open in urlscan Pro
2606:4700:3032::6815:527a  Malicious Activity! Public Scan

Submitted URL: http://fcuamoco03b.com/
Effective URL: http://fcuamoco03b.com/desktop/signin.php
Submission Tags: @ecarlesi threat phishing Search All
Submission: On January 31 via api from IT — Scanned from IT

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2606:4700:3032::6815:527a, located in United States and belongs to CLOUDFLARENET, US. The main domain is fcuamoco03b.com.
This is the only time fcuamoco03b.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: AMOCO Federal Credit Union (Financial)

Domain & IP information

IP Address AS Autonomous System
2 3 2606:4700:303... 13335 (CLOUDFLAR...)
1 2
Apex Domain
Subdomains
Transfer
3 fcuamoco03b.com
fcuamoco03b.com
489 KB
1 1
Domain Requested by
3 fcuamoco03b.com 2 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://fcuamoco03b.com/desktop/signin.php
Frame ID: 230B1EACCEA5FBAF7028F6DA7354FF45
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

AMOCO FCU

Page URL History Show full URLs

  1. http://fcuamoco03b.com/ HTTP 302
    http://fcuamoco03b.com/desktop/ HTTP 302
    http://fcuamoco03b.com/desktop/signin.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

1
Requests

0 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

570 kB
Transfer

1946 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://fcuamoco03b.com/ HTTP 302
    http://fcuamoco03b.com/desktop/ HTTP 302
    http://fcuamoco03b.com/desktop/signin.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request signin.php
fcuamoco03b.com/desktop/
Redirect Chain
  • http://fcuamoco03b.com/
  • http://fcuamoco03b.com/desktop/
  • http://fcuamoco03b.com/desktop/signin.php
2 MB
487 KB
Document
General
Full URL
http://fcuamoco03b.com/desktop/signin.php
Protocol
HTTP/1.1
Server
2606:4700:3032::6815:527a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7ba83178ff1081ca9cf04dba7981a6fc0f344d09323afe44b6a011a6020e1635

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36
accept-language
it-IT,it;q=0.9

Response headers

CF-Cache-Status
DYNAMIC
CF-RAY
84e198bc7b160e4b-MXP
Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Wed, 31 Jan 2024 11:25:54 GMT
NEL
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ulwzCGqjCV0oy3BpqFL1pGYzOQJT5Ak82G%2FLZZ8nwrKrsSw7S9IPrqDhdhhDzIZwLprKqjU2eu3c0mfMNqWfcGWtmNpi865SWO%2FGmCQvr284y0%2BUK0ordbBk3zivwIucQZhCS6fIPPQIpKfMhfg%3D"}],"group":"cf-nel","max_age":604800}
Server
cloudflare
Transfer-Encoding
chunked
alt-svc
h3=":443"; ma=86400
cache-control
no-store, no-cache, must-revalidate
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
vary
Accept-Encoding

Redirect headers

CF-Cache-Status
DYNAMIC
CF-RAY
84e198bc2a800e4b-MXP
Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Date
Wed, 31 Jan 2024 11:25:53 GMT
NEL
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=CV9i4NHEPcrBUlfflyXxz1XTrgiWKBbYQ4oaFdgiDikyR5KiB1dDvlSwoNmz%2FsmuxPtbFLMkBS32VXYNr0tDc%2FdORgZiIDkEipta38LtYJrgD4hIfNuLPnl9V1aoVGoDZMMvwulSZq4A%2F%2Furw8s%3D"}],"group":"cf-nel","max_age":604800}
Server
cloudflare
Transfer-Encoding
chunked
alt-svc
h3=":443"; ma=86400
cache-control
no-store, no-cache, must-revalidate
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
signin.php
pragma
no-cache
truncated
/
128 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f56f710ed51e12701efb353b0a16d40fb8f99136cb27f1f0cc264476c185178e

Request headers

accept-language
it-IT,it;q=0.9
Referer
http://fcuamoco03b.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
15 KB
15 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f6734f8177112c0839b961f96d813fcb189d81b60e96c33278c1983b6f419615

Request headers

Referer
http://fcuamoco03b.com/
Origin
http://fcuamoco03b.com
accept-language
it-IT,it;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
15 KB
15 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f5aebdfea35d1e7656ef4acc5db1f243209755ae3300943ef8fc6280f363c860

Request headers

Referer
http://fcuamoco03b.com/
Origin
http://fcuamoco03b.com
accept-language
it-IT,it;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
51 KB
51 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0d7ce2637795f271eddafb55abce08bfc736e366d9d3eb89c5167c5867f73561

Request headers

Referer
http://fcuamoco03b.com/
Origin
http://fcuamoco03b.com
accept-language
it-IT,it;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: AMOCO Federal Credit Union (Financial)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader

1 Cookies

Domain/Path Name / Value
fcuamoco03b.com/ Name: PHPSESSID
Value: mkte9slvl9dnfihau8r1isjpgu