URL: http://plusonetec.com/347r/3fw90je/lo.php
Submission: On March 22 via api from CA

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 8 HTTP transactions. The main IP is 153.122.9.3, located in Tokyo, Japan and belongs to ACROSS Dream Wave Shizuoka Co. Ltd., JP. The main domain is plusonetec.com.
This is the only time plusonetec.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
2 153.122.9.3 18068 (ACROSS Dr...)
1 171.161.202.200 10794 (BANKAMERICA)
8 3
Domain Requested by
2 plusonetec.com plusonetec.com
1 secure.bankofamerica.com plusonetec.com
0 www.bankofamerica.com Failed secure.bankofamerica.com
0 pane.bankofamerica.com Failed plusonetec.com
0 streak.bankofamerica.com Failed plusonetec.com
8 5

This site contains links to these domains. Also see Links.

Domain
secure.bankofamerica.com
www.bankofamerica.com
Subject Issuer Validity Valid
secure.bankofamerica.com
Symantec Class 3 EV SSL CA - G3
2016-10-21 -
2017-10-22
a year crt.sh

This page contains 1 frames:

Primary Page: http://plusonetec.com/347r/3fw90je/lo.php
Frame ID: 1823.1
Requests: 8 HTTP requests in this frame

Screenshot


Page Statistics

8
Requests

13 %
HTTPS

0 %
IPv6

2
Domains

5
Subdomains

3
IPs

2
Countries

33 kB
Transfer

57 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request lo.php
plusonetec.com/347r/3fw90je/
17 KB
17 KB
Document
General
Full URL
http://plusonetec.com/347r/3fw90je/lo.php
Protocol
HTTP/1.1
Server
153.122.9.3 Tokyo, Japan, ASN18068 (ACROSS Dream Wave Shizuoka Co. Ltd., JP),
Reverse DNS
ac.ptr54.ptrcloud.net
Software
Apache / PleskLin
Resource Hash
b55ed955c3dbbe4b98916605781b3d8c0a23efc9d08f6810741e83e283fa587f

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, sdch
Host
plusonetec.com
Accept-Language
en-US,en;q=0.8
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36

Response headers

Date
Wed, 22 Mar 2017 00:36:40 GMT
Server
Apache
Connection
close
X-Powered-By
PleskLin
Transfer-Encoding
chunked
Content-Type
text/html
vipaa-login-jawr.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/2.1/style/
0
0

vipaa-login-jawr.js
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/2.1/script/
0
0

bac_reg_logo_tmp_250X69.gif
plusonetec.com/347r/3fw90je/files/
4 KB
4 KB
Image
General
Full URL
http://plusonetec.com/347r/3fw90je/files/bac_reg_logo_tmp_250X69.gif
Requested by
Host: plusonetec.com
URL: http://plusonetec.com/347r/3fw90je/lo.php
Protocol
HTTP/1.1
Server
153.122.9.3 Tokyo, Japan, ASN18068 (ACROSS Dream Wave Shizuoka Co. Ltd., JP),
Reverse DNS
ac.ptr54.ptrcloud.net
Software
Apache / PleskLin
Resource Hash
0509ef5fb3dad7001f5095ebe63933dff0e0d113045e696ed16ff46ce5af8c72

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, sdch
Host
plusonetec.com
Accept-Language
en-US,en;q=0.8
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Accept
image/webp,image/*,*/*;q=0.8
Referer
http://plusonetec.com/347r/3fw90je/lo.php
Connection
keep-alive
Cache-Control
no-cache
Referer
http://plusonetec.com/347r/3fw90je/lo.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36

Response headers

Date
Wed, 22 Mar 2017 00:36:41 GMT
ETag
"15c05c-e0c-4f1f4c7d85380"
Last-Modified
Sun, 09 Feb 2014 08:12:14 GMT
Server
Apache
X-Powered-By
PleskLin
Content-Type
image/gif
Connection
close
Accept-Ranges
bytes
Content-Length
3596
cm-jawr.js
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/2.1/script/
37 KB
12 KB
Script
General
Full URL
https://secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/2.1/script/cm-jawr.js
Requested by
Host: plusonetec.com
URL: http://plusonetec.com/347r/3fw90je/lo.php
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
171.161.202.200 Concord, United States, ASN10794 (BANKAMERICA - Bank of America, US),
Reverse DNS
Software
/
Resource Hash
4896569a07934b21f89a3f1c86f17633013e448efda98aa0604af941d3503ea2

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, sdch, br
Host
secure.bankofamerica.com
Accept-Language
en-US,en;q=0.8
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Accept
*/*
Referer
http://plusonetec.com/347r/3fw90je/lo.php
Connection
keep-alive
Cache-Control
no-cache
Referer
http://plusonetec.com/347r/3fw90je/lo.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36

Response headers

Date
Wed, 22 Mar 2017 00:36:42 GMT
Content-Encoding
gzip
Last-Modified
Wed, 08 Feb 2017 17:28:20 GMT
Age
0
ETag
"315c-5480830d8b500"
X-BOA-RequestID
vRzJT6dGgicABSjXq3gAAAGJ
X-Serviced-By
ioR0CzSYHxenXHOm2aUmgw==--wd9Cf3PnXDCRvMm+Sbtu2A==
Content-Type
application/x-javascript
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=485
Content-Length
12636
Expires
Thu, 22 Mar 2018 00:36:42 GMT
I3n.js
streak.bankofamerica.com/30306/
0
0

a8e.js
pane.bankofamerica.com/30306/
0
0

tc_logging.js
www.bankofamerica.com/pa/global-assets/external/tc/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
secure.bankofamerica.com
URL
https://secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/2.1/style/vipaa-login-jawr.css
Domain
secure.bankofamerica.com
URL
https://secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/2.1/script/vipaa-login-jawr.js
Domain
streak.bankofamerica.com
URL
http://streak.bankofamerica.com/30306/I3n.js
Domain
pane.bankofamerica.com
URL
http://pane.bankofamerica.com/30306/a8e.js
Domain
www.bankofamerica.com
URL
https://www.bankofamerica.com/pa/global-assets/external/tc/tc_logging.js?

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies