gettrainedgetplaced.tech Open in urlscan Pro
45.113.122.63  Malicious Activity! Public Scan

Submitted URL: https://wulod-alternate.app.link/
Effective URL: https://gettrainedgetplaced.tech/b2020r/
Submission: On February 19 via manual from US

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 3 HTTP transactions. The main IP is 45.113.122.63, located in India and belongs to PUBLIC-DOMAIN-REGISTRY, US. The main domain is gettrainedgetplaced.tech.
TLS certificate: Issued by Let's Encrypt Authority X3 on January 8th 2020. Valid for: 3 months.
This is the only time gettrainedgetplaced.tech was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 2600:9000:205... 16509 (AMAZON-02)
3 45.113.122.63 394695 (PUBLIC-DO...)
3 1
Apex Domain
Subdomains
Transfer
3 gettrainedgetplaced.tech
gettrainedgetplaced.tech
73 KB
1 app.link
wulod-alternate.app.link
632 B
3 2
Domain Requested by
3 gettrainedgetplaced.tech gettrainedgetplaced.tech
1 wulod-alternate.app.link 1 redirects
3 2

This site contains no links.

Subject Issuer Validity Valid
gettrainedgetplaced.tech
Let's Encrypt Authority X3
2020-01-08 -
2020-04-07
3 months crt.sh

This page contains 1 frames:

Primary Page: https://gettrainedgetplaced.tech/b2020r/
Frame ID: 8DFA5626CA7D95D371D2A063CC057D00
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://wulod-alternate.app.link/ HTTP 307
    https://gettrainedgetplaced.tech/b2020r/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

73 kB
Transfer

142 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://wulod-alternate.app.link/ HTTP 307
    https://gettrainedgetplaced.tech/b2020r/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
gettrainedgetplaced.tech/b2020r/
Redirect Chain
  • https://wulod-alternate.app.link/
  • https://gettrainedgetplaced.tech/b2020r/
454 B
633 B
Document
General
Full URL
https://gettrainedgetplaced.tech/b2020r/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.113.122.63 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
md-in-72.webhostbox.net
Software
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7 / PHP/7.2.16
Resource Hash
a6fa0fda09c3b24826fc92233faf0f8054e57eb66a1a46b3ab54af319a8b9f51

Request headers

:method
GET
:authority
gettrainedgetplaced.tech
:scheme
https
:path
/b2020r/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
document
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

status
200
date
Wed, 19 Feb 2020 18:50:56 GMT
server
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7
x-powered-by
PHP/7.2.16
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
set-cookie
cazanova=1fef0e5a68d59b55d64de7cc4e70e06829fcca09; expires=Wed, 19-Feb-2020 20:50:56 GMT; Max-Age=7200; path=/; HttpOnly
vary
Accept-Encoding
content-encoding
gzip
accept-ranges
none
content-length
302
content-type
text/html; charset=UTF-8

Redirect headers

Content-Length
0
Connection
keep-alive
Server
openresty/1.13.6.2
Date
Wed, 19 Feb 2020 18:50:56 GMT
X-Powered-By
Express
Set-Cookie
_s=dj6qtdf85UORsDS4oDXmrOQTwTiVU5oj0h2HOB%2BwSrN%2FbZ%2FgFej6zL%2FDvy8G10m8; Max-Age=31536000; Domain=.app.link; Path=/; Expires=Thu, 18 Feb 2021 18:50:54 GMT
Last-Modified
Wed, 19 Feb 2020 18:50:56 GMT
Location
https://gettrainedgetplaced.tech/b2020r/
X-Cache
Miss from cloudfront
Via
1.1 3095e870e1a1a1b03178e40ab1872de5.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA6-C1
X-Amz-Cf-Id
CtKM6lDqsQoHKUGZ0Y1_DF5N4y1rdURaWWhQEajrrgwvJGO-O8t4DQ==
captcha.js
gettrainedgetplaced.tech/b2020r//assets/js/
123 KB
54 KB
Script
General
Full URL
https://gettrainedgetplaced.tech/b2020r//assets/js/captcha.js
Requested by
Host: gettrainedgetplaced.tech
URL: https://gettrainedgetplaced.tech/b2020r/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.113.122.63 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
md-in-72.webhostbox.net
Software
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7 /
Resource Hash
abda937cf2741f8b08acc1fa946f155ee91073120f8de3dbcd26f70fc24f698b

Request headers

Referer
https://gettrainedgetplaced.tech/b2020r/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 19 Feb 2020 18:50:57 GMT
content-encoding
gzip
last-modified
Wed, 19 Feb 2020 16:04:28 GMT
server
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
none
captcha.png
gettrainedgetplaced.tech/b2020r//
18 KB
18 KB
Image
General
Full URL
https://gettrainedgetplaced.tech/b2020r//captcha.png?_1582138259679
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.113.122.63 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
md-in-72.webhostbox.net
Software
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7 / PHP/7.2.16
Resource Hash
da7e92845bea7d877639eeb1364b30a4c300aeca10a9379d9ceed527ac925b7f

Request headers

Referer
https://gettrainedgetplaced.tech/b2020r/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 19 Feb 2020 18:50:59 GMT
content-encoding
gzip
server
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4 Phusion_Passenger/5.3.7
x-powered-by
PHP/7.2.16
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
no-store, no-cache, must-revalidate
accept-ranges
none
expires
Thu, 19 Nov 1981 08:52:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| setImmediate function| clearImmediate function| Vue

1 Cookies

Domain/Path Name / Value
gettrainedgetplaced.tech/ Name: cazanova
Value: 1fef0e5a68d59b55d64de7cc4e70e06829fcca09