Submitted URL: http://st-code.me/Category/bofa/boa/myaccount/send/bil-send.php
Effective URL: http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
Submission: On August 31 via automatic, source openphish

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 11 HTTP transactions. The main IP is 69.175.104.242, located in Chicago, United States and belongs to SINGLEHOP-LLC, US. The main domain is st-code.me.
This is the only time st-code.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
1 5 69.175.104.242 32475 (SINGLEHOP...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
11 3
Domain Requested by
5 st-code.me 1 redirects st-code.me
1 cdnjs.cloudflare.com st-code.me
0 dull.bankofamerica.com Failed st-code.me
0 boss.bankofamerica.com Failed st-code.me
0 aero.bankofamerica.com Failed st-code.me
0 secure.bankofamerica.com Failed st-code.me
11 6

This site contains no links.

Subject Issuer Validity Valid
cdnjs.cloudflare.com
DigiCert ECC Secure Server CA
2020-08-12 -
2022-08-17
2 years crt.sh

This page contains 1 frames:

Primary Page: http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
Frame ID: 123716E49C42985380A8DC82A72BB71B
Requests: 11 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://st-code.me/Category/bofa/boa/myaccount/send/bil-send.php HTTP 302
    http://st-code.me/Category/bofa/boa/myaccount/cc_s.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

11
Requests

9 %
HTTPS

50 %
IPv6

3
Domains

6
Subdomains

3
IPs

1
Countries

108 kB
Transfer

115 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://st-code.me/Category/bofa/boa/myaccount/send/bil-send.php HTTP 302
    http://st-code.me/Category/bofa/boa/myaccount/cc_s.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

11 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request cc_s.php
st-code.me/Category/bofa/boa/myaccount/
Redirect Chain
  • http://st-code.me/Category/bofa/boa/myaccount/send/bil-send.php
  • http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
10 KB
11 KB
Document
General
Full URL
http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
Protocol
HTTP/1.1
Server
69.175.104.242 Chicago, United States, ASN32475 (SINGLEHOP-LLC, US),
Reverse DNS
opal.superdomainzone.com
Software
Apache /
Resource Hash
c07bb5e0109fd508dbe9187c9a014c4e22d2a152b1fc944694f8601910ed1252

Request headers

Host
st-code.me
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=62609d552a43d87f33e998c11ba0b4a9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 31 Aug 2020 01:19:36 GMT
Server
Apache
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Mon, 31 Aug 2020 01:19:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=62609d552a43d87f33e998c11ba0b4a9; path=/
Location
../cc_s.php
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
1.css
st-code.me/Category/bofa/boa/myaccount/
220 B
424 B
Stylesheet
General
Full URL
http://st-code.me/Category/bofa/boa/myaccount/1.css
Requested by
Host: st-code.me
URL: http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
Protocol
HTTP/1.1
Server
69.175.104.242 Chicago, United States, ASN32475 (SINGLEHOP-LLC, US),
Reverse DNS
opal.superdomainzone.com
Software
Apache /
Resource Hash
9d45c01a64debff5f3387c7e46173b6544f55dbde758f52b0eaec68406aa1d1d

Request headers

Referer
http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 31 Aug 2020 01:19:36 GMT
Last-Modified
Sun, 04 Dec 2016 19:37:24 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
220
Content-Type
text/css
vipaa-v2-jawr.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/
0
0

bac_reg_logo_tmp_250X69.gif
secure.bankofamerica.com/content/images/ContextualSiteGraphics/Logos/en_US/
0
0

vipaa-v2-jawr-print.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/
0
0

jquery-3.1.0.min.js
st-code.me/Category/bofa/boa/myaccount/js/
84 KB
85 KB
Script
General
Full URL
http://st-code.me/Category/bofa/boa/myaccount/js/jquery-3.1.0.min.js
Requested by
Host: st-code.me
URL: http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
Protocol
HTTP/1.1
Server
69.175.104.242 Chicago, United States, ASN32475 (SINGLEHOP-LLC, US),
Reverse DNS
opal.superdomainzone.com
Software
Apache /
Resource Hash
702b9e051e82b32038ffdb33a4f7eb5f7b38f4cf6f514e4182d8898f4eb0b7fb

Request headers

Referer
http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 31 Aug 2020 01:19:36 GMT
Last-Modified
Sun, 04 Dec 2016 18:27:56 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
86351
Content-Type
application/javascript
jquery.maskedinput.js
cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/
10 KB
2 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/jquery.maskedinput.js
Requested by
Host: st-code.me
URL: http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4f6b , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7ef14a1e070a6a2ec9ff44ccf5e923cb2a460c5861a3db8a9ae1e21557d27020
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 31 Aug 2020 01:19:39 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
535910
x-via
cfworker/kv
status
200
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
2306
cf-request-id
04e3b240300000175ad01a8200000001
timing-allow-origin
*
last-modified
Mon, 04 May 2020 16:11:47 GMT
server
cloudflare
etag
"5eb03ec3-284d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
cf-ray
5cb2ecad1c1a175a-FRA
expires
Sat, 21 Aug 2021 01:19:39 GMT
footer.png
st-code.me/Category/bofa/boa/myaccount/
10 KB
10 KB
Image
General
Full URL
http://st-code.me/Category/bofa/boa/myaccount/footer.png
Requested by
Host: st-code.me
URL: http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
Protocol
HTTP/1.1
Server
69.175.104.242 Chicago, United States, ASN32475 (SINGLEHOP-LLC, US),
Reverse DNS
opal.superdomainzone.com
Software
Apache /
Resource Hash
535babdba17944286636a77d52ba635db26506db977d2a76f75a34efc28cbd2b

Request headers

Referer
http://st-code.me/Category/bofa/boa/myaccount/cc_s.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 31 Aug 2020 01:19:51 GMT
Last-Modified
Sat, 04 Feb 2017 05:41:12 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
10474
Content-Type
image/png
I3n.js
aero.bankofamerica.com/30306/
0
0

a8e.js
boss.bankofamerica.com/30306/
0
0

y9h.js
dull.bankofamerica.com/boaa/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
secure.bankofamerica.com
URL
https://secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/vipaa-v2-jawr.css
Domain
secure.bankofamerica.com
URL
https://secure.bankofamerica.com/content/images/ContextualSiteGraphics/Logos/en_US/bac_reg_logo_tmp_250X69.gif
Domain
secure.bankofamerica.com
URL
https://secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/vipaa-v2-jawr-print.css
Domain
aero.bankofamerica.com
URL
http://aero.bankofamerica.com/30306/I3n.js
Domain
boss.bankofamerica.com
URL
http://boss.bankofamerica.com/30306/a8e.js
Domain
dull.bankofamerica.com
URL
http://dull.bankofamerica.com/boaa/y9h.js

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| getSCookie function| get_SessionIdString object| boaPageDataJS object| theBody function| $ function| jQuery

0 Cookies