sumak.com.ua
Open in
urlscan Pro
195.64.155.80
Malicious Activity!
Public Scan
Submission: On May 03 via automatic, source phishtank
Summary
This is the only time sumak.com.ua was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 195.64.155.80 195.64.155.80 | 197726 (UKRNAMES-AS) (UKRNAMES-AS) | |
18 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
sumak.com.ua
sumak.com.ua |
1 MB |
0 |
bankofamerica.com
Failed
aero.bankofamerica.com Failed boss.bankofamerica.com Failed dull.bankofamerica.com Failed |
|
18 | 2 |
Domain | Requested by | |
---|---|---|
14 | sumak.com.ua |
sumak.com.ua
|
0 | dull.bankofamerica.com Failed |
sumak.com.ua
|
0 | boss.bankofamerica.com Failed |
sumak.com.ua
|
0 | aero.bankofamerica.com Failed |
sumak.com.ua
|
18 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
secure.bankofamerica.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/
Frame ID: 15669.1
Requests: 18 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Forgot your Passcode?
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/ |
36 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v2-jawr.css
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
220 KB 220 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v2-jawr.js
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
783 KB 783 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cc.go
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
29 KB 29 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g8C
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
137 B 137 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g8C_002
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
137 B 137 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
head1.png
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ad.png
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
head.png
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-v2-jawr-print.css
sumak.com.ua/catalog/view/theme/default/template/enbofa-auth/B/index_files/ |
302 B 302 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
I3n.js
aero.bankofamerica.com/30306/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
a8e.js
boss.bankofamerica.com/30306/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
y9h.js
dull.bankofamerica.com/boaa/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
help-qm-fsd.png
sumak.com.ua/pa/global-assets/1.0/graphic/ |
365 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign-in-sprite.png
sumak.com.ua/pa/global-assets/1.0/graphic/ |
368 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-regular.woff
sumak.com.ua/pa/global-assets/1.0/font/cnx-regular/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cc.go
sumak.com.ua/login/sign-in/ |
340 B 0 |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-regular.ttf
sumak.com.ua/pa/global-assets/1.0/font/cnx-regular/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- aero.bankofamerica.com
- URL
- http://aero.bankofamerica.com/30306/I3n.js
- Domain
- boss.bankofamerica.com
- URL
- http://boss.bankofamerica.com/30306/a8e.js
- Domain
- dull.bankofamerica.com
- URL
- http://dull.bankofamerica.com/boaa/y9h.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sumak.com.ua/ | Name: _cc Value: NmU4MGUwMmQtYzdiZi00Njhm |
|
.sumak.com.ua/ | Name: mbox Value: check#true#1493845007|session#1493844946848-640347#1493846807 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aero.bankofamerica.com
boss.bankofamerica.com
dull.bankofamerica.com
sumak.com.ua
aero.bankofamerica.com
boss.bankofamerica.com
dull.bankofamerica.com
195.64.155.80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