saurus.rs
Open in
urlscan Pro
77.105.36.156
Malicious Activity!
Public Scan
Submission: On November 19 via api from US — Scanned from US
Summary
This is the only time saurus.rs was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 77.105.36.156 77.105.36.156 | 9125 (ORIONTELE...) (ORIONTELEKOM-AS) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
saurus.rs
1 redirects
saurus.rs www.saurus.rs |
735 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | saurus.rs |
1 redirects
saurus.rs
|
1 | www.saurus.rs |
saurus.rs
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://saurus.rs/BofA/otp.html
Frame ID: 577FF8EC8A118B8AEEADD58EC5D1B0C2
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://saurus.rs/BofA/images/assets-images-site-secure-ah-forgot-common-loader_black-CSX85ecad56.gif HTTP 301
- http://www.saurus.rs/BofA/images/assets-images-site-secure-ah-forgot-common-loader_black-CSX85ecad56.gif
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
otp.html
saurus.rs/BofA/ |
346 KB 346 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bactouch.css
saurus.rs/BofA/images/ |
158 KB 158 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mask.js
saurus.rs/BofA/images/ |
146 KB 146 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-logos-BofA_rgb-CSX5624a146.svg
saurus.rs/BofA/images/ |
3 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-site-secure-ah-forgot-common-BofA_symbol_rgb-CSX33067442.svg
saurus.rs/BofA/images/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-site-secure-ah-forgot-common-loader_black-CSX85ecad56.gif
www.saurus.rs/BofA/images/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
secure_lock.png
saurus.rs/BofA/images/ |
352 B 594 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-header-lock-CSX1f35fd71.png
saurus.rs/BofA/images/ |
51 KB 51 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-footer-eha_logo_1x-CSXc5bd9130.png
saurus.rs/BofA/images/ |
343 B 584 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-header-secure-lock-CSXa09bf5fc.svg
saurus.rs/BofA/images/ |
353 B 599 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-title-flagscape_red-CSX345e7fd7.svg
saurus.rs/BofA/images/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-regular.woff2
saurus.rs/BofA/ |
11 KB 12 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-medium.woff2
saurus.rs/BofA/ |
12 KB 12 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| IMask object| element object| maskOptions object| mask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
saurus.rs
www.saurus.rs
77.105.36.156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