covidcardusa.org Open in urlscan Pro
194.169.175.192  Malicious Activity! Public Scan

URL: https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/overviewshn.php?cmd=_account-details
Submission: On June 27 via api from JP — Scanned from JP

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 194.169.175.192, located in Netherlands and belongs to AS-SUISSE, SC. The main domain is covidcardusa.org.
TLS certificate: Issued by R3 on June 26th 2023. Valid for: 3 months.
This is the only time covidcardusa.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
3 194.169.175.192 211760 (AS-SUISSE)
3 1
Apex Domain
Subdomains
Transfer
3 covidcardusa.org
covidcardusa.org
319 KB
3 1
Domain Requested by
3 covidcardusa.org covidcardusa.org
3 1

This site contains no links.

Subject Issuer Validity Valid
webdisk.covidcardusa.org
R3
2023-06-26 -
2023-09-24
3 months crt.sh

This page contains 1 frames:

Primary Page: https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/overviewshn.php?cmd=_account-details
Frame ID: D02419FBA5E98E48782457DB70242424
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Bank of America | Online Banking | Account | Overview

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

319 kB
Transfer

318 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request overviewshn.php
covidcardusa.org/cwrit/bankofamerica/c5b311a7/
4 KB
4 KB
Document
General
Full URL
https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/overviewshn.php?cmd=_account-details
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
194.169.175.192 , Netherlands, ASN211760 (AS-SUISSE, SC),
Reverse DNS
net-194-169-175-192.cust.as211760.net
Software
Apache /
Resource Hash
6ce3f91ecfd896ea6aff37cf5b65cfa9179e85a14784ba00cde17ab64c7a6c64

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Tue, 27 Jun 2023 23:51:26 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Transfer-Encoding
chunked
overlay.png
covidcardusa.org/cwrit/bankofamerica/c5b311a7/images/
18 KB
19 KB
Image
General
Full URL
https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/images/overlay.png
Requested by
Host: covidcardusa.org
URL: https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/overviewshn.php?cmd=_account-details
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
194.169.175.192 , Netherlands, ASN211760 (AS-SUISSE, SC),
Reverse DNS
net-194-169-175-192.cust.as211760.net
Software
Apache /
Resource Hash
d4c6320f559647450fba0bb00adf33f8182f42f8d13fed699480c20e6a304c2c

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/overviewshn.php?cmd=_account-details
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36

Response headers

Date
Tue, 27 Jun 2023 23:51:26 GMT
Last-Modified
Tue, 27 Jun 2023 04:15:03 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
18757
bgimage.png
covidcardusa.org/cwrit/bankofamerica/c5b311a7/
296 KB
296 KB
Image
General
Full URL
https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/bgimage.png
Requested by
Host: covidcardusa.org
URL: https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/overviewshn.php?cmd=_account-details
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
194.169.175.192 , Netherlands, ASN211760 (AS-SUISSE, SC),
Reverse DNS
net-194-169-175-192.cust.as211760.net
Software
Apache /
Resource Hash
552295b547de8dc2d3453246e24505349cabbc10480121b024920ea94f1afcb3

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://covidcardusa.org/cwrit/bankofamerica/c5b311a7/overviewshn.php?cmd=_account-details
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36

Response headers

Date
Tue, 27 Jun 2023 23:51:26 GMT
Last-Modified
Tue, 27 Jun 2023 04:15:03 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
302597

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend function| validateForm

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

covidcardusa.org
194.169.175.192
552295b547de8dc2d3453246e24505349cabbc10480121b024920ea94f1afcb3
6ce3f91ecfd896ea6aff37cf5b65cfa9179e85a14784ba00cde17ab64c7a6c64
d4c6320f559647450fba0bb00adf33f8182f42f8d13fed699480c20e6a304c2c