uniasia.net
Open in
urlscan Pro
203.188.252.55
Malicious Activity!
Public Scan
Submission: On October 14 via automatic, source openphish
Summary
This is the only time uniasia.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 203.188.252.55 203.188.252.55 | 9832 (ISN-AS-AP...) (ISN-AS-AP ISN) | |
5 | 171.161.198.200 171.161.198.200 | 10794 (BANKAMERICA) (BANKAMERICA - Bank of America) | |
1 | 54.236.226.29 54.236.226.29 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
3 | 52.200.21.251 52.200.21.251 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 | 52.23.2.103 52.23.2.103 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
13 | 5 |
ASN9832 (ISN-AS-AP ISN, Internet Service Provider, BD)
PTR: mail.iiibd.com
uniasia.net |
ASN10794 (BANKAMERICA - Bank of America, US)
secure.bankofamerica.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-54-236-226-29.compute-1.amazonaws.com
aero.bankofamerica.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-200-21-251.compute-1.amazonaws.com
boss.bankofamerica.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-23-2-103.compute-1.amazonaws.com
dull.bankofamerica.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
bankofamerica.com
secure.bankofamerica.com aero.bankofamerica.com boss.bankofamerica.com dull.bankofamerica.com |
87 KB |
3 |
uniasia.net
uniasia.net |
98 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
5 | secure.bankofamerica.com |
uniasia.net
|
3 | boss.bankofamerica.com |
uniasia.net
|
3 | uniasia.net |
uniasia.net
|
1 | dull.bankofamerica.com |
uniasia.net
|
1 | aero.bankofamerica.com |
uniasia.net
|
13 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
secure.bankofamerica.com Entrust Certification Authority - L1M |
2018-05-15 - 2019-05-15 |
a year | crt.sh |
This page contains 3 frames:
Primary Page:
http://uniasia.net/login.bankofamerica/17274e9cddd150121ff713a7e9604965/email_error.php
Frame ID: A34832DB5D2B8810195455D7FA3CBA86
Requests: 11 HTTP requests in this frame
Frame:
http://boss.bankofamerica.com/30306/rfUW.html?si=4&e=http%3A%2F%2Funiasia.net&LSESSIONID=jLd1oaAd64UkcS%2BHKhkv3D8MqPuSpH7YUEC4EXavFtPX08UvNcNz48I%3D&t=xframe&eu=http%3A%2F%2Funiasia.net%2Flogin.bankofamerica%2F17274e9cddd150121ff713a7e9604965%2Femail_error.php&icid=153949667478115114
Frame ID: C49C7E31B87284248266B74E0DD1E345
Requests: 1 HTTP requests in this frame
Frame:
http://boss.bankofamerica.com/30306/TBSX.html/discovercard.com/dfs/accounthome/summary/-www.schwab.com/secure.accurint.com/unfcu2.org//login1/wachovia.com/MyAccounts.aspx/investing.schwab.com/secure/schwab///https://snsbank.nl/mijnsns/secure/login/httpsabph.pl/pi/do/Authorization/alfabank.ru/swedbank/pf.bgz.pl/httponline.eurobank.pl/?cid=5&si=4&e=http%3A%2F%2Funiasia.net&LSESSIONID=jLd1oaAd64UkcS%2BHKhkv3D8MqPuSpH7YUEC4EXavFtPX08UvNcNz48I%3D&t=xframe&eu=http%3A%2F%2Funiasia.net%2Flogin.bankofamerica%2F17274e9cddd150121ff713a7e9604965%2Femail_error.php&icid=15394966747842141
Frame ID: E7B79A0AD69B6E2252EF5B4206A4C245
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
email_error.php
uniasia.net/login.bankofamerica/17274e9cddd150121ff713a7e9604965/ |
9 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
1.css
uniasia.net/login.bankofamerica/17274e9cddd150121ff713a7e9604965/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v2-jawr.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/ |
218 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bac_reg_logo_tmp_250X69.gif
secure.bankofamerica.com/content/images/ContextualSiteGraphics/Logos/en_US/ |
4 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer1.png
uniasia.net/login.bankofamerica/17274e9cddd150121ff713a7e9604965/ |
88 KB 89 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v2-jawr-print.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/ |
302 B 672 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
I3n.js
aero.bankofamerica.com/30306/ |
25 KB 12 KB |
XHR
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a8e.js
boss.bankofamerica.com/30306/ |
41 KB 17 KB |
XHR
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
y9h.js
dull.bankofamerica.com/boaa/ |
39 KB 16 KB |
XHR
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign-in-sprite.png
secure.bankofamerica.com/pa/global-assets/1.0/graphic/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-secure-esp-sprite.png
secure.bankofamerica.com/pa/components/modules/header-module/2.8/graphic/ |
473 B 896 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rfUW.html
boss.bankofamerica.com/30306/ Frame C49C |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
boss.bankofamerica.com/30306/TBSX.html/discovercard.com/dfs/accounthome/summary/-www.schwab.com/secure.accurint.com/unfcu2.org//login1/wachovia.com/MyAccounts.aspx/investing.schwab.com/secure/schwa... Frame E7B7 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| getSCookie function| get_SessionIdString object| boaPageDataJS object| theBody object| ___so30306 string| PSESSIONID string| SSESSIONID object| regex object| match string| LSESSIONID object| __tp number| __gt2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
uniasia.net/ | Name: PHPSESSID Value: 1j0ce9bear8mslk6lmfcsnrfd0 |
|
uniasia.net/login.bankofamerica/17274e9cddd150121ff713a7e9604965 | Name: last_display Value: 1539496670 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aero.bankofamerica.com
boss.bankofamerica.com
dull.bankofamerica.com
secure.bankofamerica.com
uniasia.net
171.161.198.200
203.188.252.55
52.200.21.251
52.23.2.103
54.236.226.29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