bankofamericahelpline.com
Open in
urlscan Pro
2606:4700:3035::ac43:d0b7
Malicious Activity!
Public Scan
Submission: On January 10 via api from BE — Scanned from DE
Summary
This is the only time bankofamericahelpline.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2606:4700:303... 2606:4700:3035::ac43:d0b7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
bankofamericahelpline.com
bankofamericahelpline.com |
250 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | bankofamericahelpline.com |
bankofamericahelpline.com
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://bankofamericahelpline.com/
Frame ID: D506F37D42C7182A95146FC992D4EA39
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
bankofamericahelpline.com/ |
32 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
bankofamericahelpline.com/css/ |
540 KB 69 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
bankofamericahelpline.com/js/ |
156 KB 40 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.min.js
bankofamericahelpline.com/js/ |
49 KB 13 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BofA_rgb.png
bankofamericahelpline.com/img/ |
38 KB 39 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobile_llama.png
bankofamericahelpline.com/img/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MyBaby.js
bankofamericahelpline.com/js/ |
17 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-secure-esp-sprite.png
bankofamericahelpline.com/img/ |
473 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
help-qm-fsd.png
bankofamericahelpline.com/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign-in-sprite.png
bankofamericahelpline.com/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfootb-static-sprite.png
bankofamericahelpline.com/img/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfoot-home-icon.png
bankofamericahelpline.com/img/ |
144 B 891 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| _0x3544 function| _0x522f number| minLength number| maxLength string| malidtra object| _0x3685 function| _0x57b31 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bankofamericahelpline.com/ | Name: PHPSESSID Value: 93q6p4077ne7b60nifckp09fhi |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bankofamericahelpline.com
2606:4700:3035::ac43:d0b7
2a1b1589e316d02ab75481e7aa88c9975afd2e87f17982fb6d38b6ebe2425a4c
30652cee5990b3b76f6cbf6f26362be9254dd62b4c6e6003c1127d1484573787
3aff7c9a7e7770ba800ae672e3059379a22787edc69ae322b4e1209bd81e106e
40abd137fab630a53cef77823899552bd9741f7840e409e1afd168b5500961f9
6bb1d4b1b719488b9812d1fb67b41b03857eec8f4e0a4d46a8066574037d817a
89db88fadaf63fd4e91d869fed81834918debd6eacbe6e47b5ad54e061996aed
8c37fb372596058d87dd9208541c49b020d0e840e4f3a5baa27d39be2dc70b01
a8bc6337547a246ef75d1ae66d7ec8a0ed6171c1ba49804a403124e27c8e8452
b7f2b921010eb75d466ec8e24315a62bed3ab0a5ae5798c93f1664391253bbad
ca3205c6a4eecfd67ad990b62b10e19f601230a2a5b2791676089e82836763f4
d2665d0f900ad2eed18cb80f6f8ac068538081b3e76233dc010b9b64e3366f07
e1ac56ae25629e508f729b799d563d71920902a4cb26cf3bb602beb3e368775e